Analysis
-
max time kernel
31s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 18:02
Behavioral task
behavioral1
Sample
LARKSHARP SPOOFER.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
LARKSHARP SPOOFER.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
LARKSHARP SPOOFER.exe
-
Size
10.0MB
-
MD5
1e61aac32833d7e38884ae4df8e9748e
-
SHA1
b2f17de7878360c69f6c103cfb0d2f77c530cd39
-
SHA256
eb04c7fde0ba573eae3e9307a3c91613e2eb4c41e97e0ad7a3979d2ac0e1dff1
-
SHA512
947758430b35760ac87cacf9ba42c04b13628b67c9ce1bd866cb362021537f10f99869c73c62cbf7cf177fa2da285ebce11e23688e79eda22b157fa47ef9bd01
-
SSDEEP
196608:v6Dg6CsXDjDVdJolpPgToa10/inHu7eu0jr5MJLheXAxFg6XVnZ+YtlBGFOnJBDP:SE6CED/J83a10anHKeT/5QKAHBlZ7l4C
Malware Config
Signatures
-
Cerber 42 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 2948 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE -
Executes dropped EXE 64 IoCs
pid Process 2912 randomizer.exe 2012 randomizer.exe 2376 AMIDEWINx64.EXE 2916 AMIDEWINx64.EXE 352 AMIDEWINx64.EXE 532 AMIDEWINx64.EXE 2016 AMIDEWINx64.EXE 1156 AMIDEWINx64.EXE 2504 AMIDEWINx64.EXE 2196 AMIDEWINx64.EXE 1876 AMIDEWINx64.EXE 2100 AMIDEWINx64.EXE 2116 AMIDEWINx64.EXE 1492 AMIDEWINx64.EXE 264 AMIDEWINx64.EXE 2184 AMIDEWINx64.EXE 2388 AMIDEWINx64.EXE 1884 AMIDEWINx64.EXE 1660 AMIDEWINx64.EXE 1320 AMIDEWINx64.EXE 2372 AMIDEWINx64.EXE 1824 AMIDEWINx64.EXE 2428 AMIDEWINx64.EXE 844 AMIDEWINx64.EXE 1716 AMIDEWINx64.EXE 1384 AMIDEWINx64.EXE 924 AMIDEWINx64.EXE 568 AMIDEWINx64.EXE 2736 AMIDEWINx64.EXE 2292 AMIDEWINx64.EXE 1304 AMIDEWINx64.EXE 1060 AMIDEWINx64.EXE 1396 AMIDEWINx64.EXE 1564 AMIDEWINx64.EXE 1548 AMIDEWINx64.EXE 1244 AMIDEWINx64.EXE 1940 AMIDEWINx64.EXE 1224 AMIDEWINx64.EXE 1980 AMIDEWINx64.EXE 1604 AMIDEWINx64.EXE 2064 AMIDEWINx64.EXE 288 AMIDEWINx64.EXE 3048 AMIDEWINx64.EXE 2492 mac.exe 2912 randomizer.exe 2012 randomizer.exe 2376 AMIDEWINx64.EXE 2916 AMIDEWINx64.EXE 352 AMIDEWINx64.EXE 532 AMIDEWINx64.EXE 2016 AMIDEWINx64.EXE 1156 AMIDEWINx64.EXE 2504 AMIDEWINx64.EXE 2196 AMIDEWINx64.EXE 1876 AMIDEWINx64.EXE 2100 AMIDEWINx64.EXE 2116 AMIDEWINx64.EXE 1492 AMIDEWINx64.EXE 264 AMIDEWINx64.EXE 2184 AMIDEWINx64.EXE 2388 AMIDEWINx64.EXE 1884 AMIDEWINx64.EXE 1660 AMIDEWINx64.EXE 1320 AMIDEWINx64.EXE -
Loads dropped DLL 64 IoCs
pid Process 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2012 randomizer.exe 2012 randomizer.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2476 cmd.exe 2864 LARKSHARP SPOOFER.exe 2492 mac.exe 2492 mac.exe 2492 mac.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2864 LARKSHARP SPOOFER.exe 2012 randomizer.exe 2012 randomizer.exe -
Kills process with taskkill 1 IoCs
pid Process 2948 taskkill.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2948 taskkill.exe Token: SeIncreaseQuotaPrivilege 2088 WMIC.exe Token: SeSecurityPrivilege 2088 WMIC.exe Token: SeTakeOwnershipPrivilege 2088 WMIC.exe Token: SeLoadDriverPrivilege 2088 WMIC.exe Token: SeSystemProfilePrivilege 2088 WMIC.exe Token: SeSystemtimePrivilege 2088 WMIC.exe Token: SeProfSingleProcessPrivilege 2088 WMIC.exe Token: SeIncBasePriorityPrivilege 2088 WMIC.exe Token: SeCreatePagefilePrivilege 2088 WMIC.exe Token: SeBackupPrivilege 2088 WMIC.exe Token: SeRestorePrivilege 2088 WMIC.exe Token: SeShutdownPrivilege 2088 WMIC.exe Token: SeDebugPrivilege 2088 WMIC.exe Token: SeSystemEnvironmentPrivilege 2088 WMIC.exe Token: SeRemoteShutdownPrivilege 2088 WMIC.exe Token: SeUndockPrivilege 2088 WMIC.exe Token: SeManageVolumePrivilege 2088 WMIC.exe Token: 33 2088 WMIC.exe Token: 34 2088 WMIC.exe Token: 35 2088 WMIC.exe Token: SeIncreaseQuotaPrivilege 2088 WMIC.exe Token: SeSecurityPrivilege 2088 WMIC.exe Token: SeTakeOwnershipPrivilege 2088 WMIC.exe Token: SeLoadDriverPrivilege 2088 WMIC.exe Token: SeSystemProfilePrivilege 2088 WMIC.exe Token: SeSystemtimePrivilege 2088 WMIC.exe Token: SeProfSingleProcessPrivilege 2088 WMIC.exe Token: SeIncBasePriorityPrivilege 2088 WMIC.exe Token: SeCreatePagefilePrivilege 2088 WMIC.exe Token: SeBackupPrivilege 2088 WMIC.exe Token: SeRestorePrivilege 2088 WMIC.exe Token: SeShutdownPrivilege 2088 WMIC.exe Token: SeDebugPrivilege 2088 WMIC.exe Token: SeSystemEnvironmentPrivilege 2088 WMIC.exe Token: SeRemoteShutdownPrivilege 2088 WMIC.exe Token: SeUndockPrivilege 2088 WMIC.exe Token: SeManageVolumePrivilege 2088 WMIC.exe Token: 33 2088 WMIC.exe Token: 34 2088 WMIC.exe Token: 35 2088 WMIC.exe Token: SeDebugPrivilege 2948 taskkill.exe Token: SeIncreaseQuotaPrivilege 2088 WMIC.exe Token: SeSecurityPrivilege 2088 WMIC.exe Token: SeTakeOwnershipPrivilege 2088 WMIC.exe Token: SeLoadDriverPrivilege 2088 WMIC.exe Token: SeSystemProfilePrivilege 2088 WMIC.exe Token: SeSystemtimePrivilege 2088 WMIC.exe Token: SeProfSingleProcessPrivilege 2088 WMIC.exe Token: SeIncBasePriorityPrivilege 2088 WMIC.exe Token: SeCreatePagefilePrivilege 2088 WMIC.exe Token: SeBackupPrivilege 2088 WMIC.exe Token: SeRestorePrivilege 2088 WMIC.exe Token: SeShutdownPrivilege 2088 WMIC.exe Token: SeDebugPrivilege 2088 WMIC.exe Token: SeSystemEnvironmentPrivilege 2088 WMIC.exe Token: SeRemoteShutdownPrivilege 2088 WMIC.exe Token: SeUndockPrivilege 2088 WMIC.exe Token: SeManageVolumePrivilege 2088 WMIC.exe Token: 33 2088 WMIC.exe Token: 34 2088 WMIC.exe Token: 35 2088 WMIC.exe Token: SeIncreaseQuotaPrivilege 2088 WMIC.exe Token: SeSecurityPrivilege 2088 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2864 1900 LARKSHARP SPOOFER.exe 31 PID 1900 wrote to memory of 2864 1900 LARKSHARP SPOOFER.exe 31 PID 1900 wrote to memory of 2864 1900 LARKSHARP SPOOFER.exe 31 PID 2864 wrote to memory of 2776 2864 LARKSHARP SPOOFER.exe 32 PID 2864 wrote to memory of 2776 2864 LARKSHARP SPOOFER.exe 32 PID 2864 wrote to memory of 2776 2864 LARKSHARP SPOOFER.exe 32 PID 2776 wrote to memory of 2556 2776 cmd.exe 33 PID 2776 wrote to memory of 2556 2776 cmd.exe 33 PID 2776 wrote to memory of 2556 2776 cmd.exe 33 PID 2864 wrote to memory of 2948 2864 LARKSHARP SPOOFER.exe 34 PID 2864 wrote to memory of 2948 2864 LARKSHARP SPOOFER.exe 34 PID 2864 wrote to memory of 2948 2864 LARKSHARP SPOOFER.exe 34 PID 2864 wrote to memory of 2912 2864 LARKSHARP SPOOFER.exe 37 PID 2864 wrote to memory of 2912 2864 LARKSHARP SPOOFER.exe 37 PID 2864 wrote to memory of 2912 2864 LARKSHARP SPOOFER.exe 37 PID 2912 wrote to memory of 2012 2912 randomizer.exe 39 PID 2912 wrote to memory of 2012 2912 randomizer.exe 39 PID 2912 wrote to memory of 2012 2912 randomizer.exe 39 PID 2864 wrote to memory of 2260 2864 LARKSHARP SPOOFER.exe 40 PID 2864 wrote to memory of 2260 2864 LARKSHARP SPOOFER.exe 40 PID 2864 wrote to memory of 2260 2864 LARKSHARP SPOOFER.exe 40 PID 2260 wrote to memory of 2476 2260 cmd.exe 42 PID 2260 wrote to memory of 2476 2260 cmd.exe 42 PID 2260 wrote to memory of 2476 2260 cmd.exe 42 PID 2476 wrote to memory of 2376 2476 cmd.exe 43 PID 2476 wrote to memory of 2376 2476 cmd.exe 43 PID 2476 wrote to memory of 2376 2476 cmd.exe 43 PID 2476 wrote to memory of 2916 2476 cmd.exe 44 PID 2476 wrote to memory of 2916 2476 cmd.exe 44 PID 2476 wrote to memory of 2916 2476 cmd.exe 44 PID 2476 wrote to memory of 352 2476 cmd.exe 45 PID 2476 wrote to memory of 352 2476 cmd.exe 45 PID 2476 wrote to memory of 352 2476 cmd.exe 45 PID 2476 wrote to memory of 532 2476 cmd.exe 46 PID 2476 wrote to memory of 532 2476 cmd.exe 46 PID 2476 wrote to memory of 532 2476 cmd.exe 46 PID 2476 wrote to memory of 2016 2476 cmd.exe 47 PID 2476 wrote to memory of 2016 2476 cmd.exe 47 PID 2476 wrote to memory of 2016 2476 cmd.exe 47 PID 2476 wrote to memory of 1156 2476 cmd.exe 48 PID 2476 wrote to memory of 1156 2476 cmd.exe 48 PID 2476 wrote to memory of 1156 2476 cmd.exe 48 PID 2476 wrote to memory of 2504 2476 cmd.exe 49 PID 2476 wrote to memory of 2504 2476 cmd.exe 49 PID 2476 wrote to memory of 2504 2476 cmd.exe 49 PID 2476 wrote to memory of 2196 2476 cmd.exe 50 PID 2476 wrote to memory of 2196 2476 cmd.exe 50 PID 2476 wrote to memory of 2196 2476 cmd.exe 50 PID 2476 wrote to memory of 1876 2476 cmd.exe 51 PID 2476 wrote to memory of 1876 2476 cmd.exe 51 PID 2476 wrote to memory of 1876 2476 cmd.exe 51 PID 2476 wrote to memory of 2100 2476 cmd.exe 52 PID 2476 wrote to memory of 2100 2476 cmd.exe 52 PID 2476 wrote to memory of 2100 2476 cmd.exe 52 PID 2476 wrote to memory of 2116 2476 cmd.exe 53 PID 2476 wrote to memory of 2116 2476 cmd.exe 53 PID 2476 wrote to memory of 2116 2476 cmd.exe 53 PID 2476 wrote to memory of 1492 2476 cmd.exe 54 PID 2476 wrote to memory of 1492 2476 cmd.exe 54 PID 2476 wrote to memory of 1492 2476 cmd.exe 54 PID 2476 wrote to memory of 264 2476 cmd.exe 55 PID 2476 wrote to memory of 264 2476 cmd.exe 55 PID 2476 wrote to memory of 264 2476 cmd.exe 55 PID 2476 wrote to memory of 2184 2476 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\LARKSHARP SPOOFER.exe"C:\Users\Admin\AppData\Local\Temp\LARKSHARP SPOOFER.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\LARKSHARP SPOOFER.exe"C:\Users\Admin\AppData\Local\Temp\LARKSHARP SPOOFER.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con: cols=110 lines=303⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\mode.commode con: cols=110 lines=304⤵PID:2556
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM explorer.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\randomizer.exeC:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\randomizer.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\randomizer.exeC:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\randomizer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c "C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\spoof.bat >nul 2>&1""3⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\cmd.execmd.exe /c "C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\spoof.bat >nul 2>&1"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /ID 06/15/20205⤵
- Cerber
- Executes dropped EXE
PID:2376
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV YTtXfhCJxgpiJPq5⤵
- Cerber
- Executes dropped EXE
PID:2916
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS kzflow69DKvBUuV5⤵
- Cerber
- Executes dropped EXE
PID:352
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF siJ07zyvc5N1w095⤵
- Cerber
- Executes dropped EXE
PID:532
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO5⤵
- Cerber
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK FDirjwSBTRk0oJG5⤵
- Cerber
- Executes dropped EXE
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF c4JXlDYAL1s4wiq5⤵
- Cerber
- Executes dropped EXE
PID:2504
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 52y9L9zXjycPSfr5⤵
- Cerber
- Executes dropped EXE
PID:2196
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS jyNezqthzBPhk8Z5⤵
- Cerber
- Executes dropped EXE
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT ehim5M2KRSmWfrW5⤵
- Cerber
- Executes dropped EXE
PID:2100
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC E9zB27WT29aUpbO5⤵
- Cerber
- Executes dropped EXE
PID:2116
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV LozFQHQKgrcioh35⤵
- Cerber
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 1D9sNb25xeCvOSa5⤵
- Cerber
- Executes dropped EXE
PID:264
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM XuYsr4TC7endgHQ5⤵
- Cerber
- Executes dropped EXE
PID:2184
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 0owLx8GewoiOYOP5⤵
- Cerber
- Executes dropped EXE
PID:2388
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK VdF0tsXWn5WHOZa5⤵
- Cerber
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN WBY6jg9B2GH03PO5⤵
- Cerber
- Executes dropped EXE
PID:1660
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT lVzVio9kndzMxY35⤵
- Cerber
- Executes dropped EXE
PID:1320
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN mR6ihY279eZoVzM5⤵
- Cerber
- Executes dropped EXE
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BSH 3 WrGSlOQWizDQ2XM5⤵
- Cerber
- Executes dropped EXE
PID:1824
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BMH 3 N6o1q4iXI36uUMa5⤵
- Cerber
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BPH 3 k8CCeFngGBgD0JE5⤵
- Cerber
- Executes dropped EXE
PID:844
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BVH 3 eSOC9Qb4l2LSJv25⤵
- Cerber
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSH 4 FqVnxLqXED1y8Qn5⤵
- Cerber
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CMH 4 aCpZLIOvXGfJTLy5⤵
- Cerber
- Executes dropped EXE
PID:924
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CVH 4 IIrCbnYXhnKMZJr5⤵
- Cerber
- Executes dropped EXE
PID:568
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CAH 4 ZFQs5kbt951kHgs5⤵
- Cerber
- Executes dropped EXE
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSKH 4 c8KPqPVxfqSQvVv5⤵
- Cerber
- Executes dropped EXE
PID:2292
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BTH 3 ZvNtdKtONHZT5qU5⤵
- Cerber
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLCH 3 Si5o2HoS0a8AQgM5⤵
- Cerber
- Executes dropped EXE
PID:1060
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /IVN 6u7HaI5kEbogJ7j5⤵
- Cerber
- Executes dropped EXE
PID:1396
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 2.6.95⤵
- Cerber
- Executes dropped EXE
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM o9ppO9X1FOlZMY55⤵
- Cerber
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP t0JWjL9G8gwVO9p5⤵
- Cerber
- Executes dropped EXE
PID:1244
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 1YhLLkdajfFSPmZ5⤵
- Cerber
- Executes dropped EXE
PID:1940
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP s0DBf7ZmpTMtwSD5⤵
- Cerber
- Executes dropped EXE
PID:1224
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /SCO 1 D09aLgqwyVukfVr5⤵
- Cerber
- Executes dropped EXE
PID:1980
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 1 D1UmeoyIFKBoy0y5⤵
- Cerber
- Executes dropped EXE
PID:1604
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 3 tZ9mw0qBDTS8KFT5⤵
- Cerber
- Executes dropped EXE
PID:2064
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 4 5dstsWwIMeJmvvj5⤵
- Cerber
- Executes dropped EXE
PID:288
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 5 ZNlW8gGzhvxklJC5⤵
- Cerber
- Executes dropped EXE
PID:3048
-
-
-
-
C:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\mac.exeC:\Users\Admin\AppData\Roaming\tmpy4nw5z8l\mac.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE >nul 2>&14⤵PID:3000
-
C:\Windows\System32\Wbem\WMIC.exeWMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD56bfe0519e242720f965bb1680356728c
SHA1f6a5392214ade1750af15fdcaa6f05bf8ee06f9e
SHA256a922b1906f9b04b582e8ace9a17e6b6d405df15f4ab30bdc55f2fc5df7a5c9c3
SHA512cf47a256fd970d1de50645c23fc68a18cec6873475e06d567d7ef065ea913d8ac98cc5e811113ff5c161786544898d03d375f683b1e31551e9dd41ac036433af
-
Filesize
561KB
MD572f3d84384e888bf0d38852eb863026b
SHA18e6a0257591eb913ae7d0e975c56306b3f680b3f
SHA256a4c2229bdc2a2a630acdc095b4d86008e5c3e3bc7773174354f3da4f5beb9cde
SHA5126d53634bc51bd383358e0d55988d70aee6ed3897bc6ae5e0d2413bed27ecff4c8092020682cd089859023b02d9a1858ac42e64d59c38ba90fbaf89b656c539a6
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
35KB
MD59cff894542dc399e0a46dee017331edf
SHA1d1e889d22a5311bd518517537ca98b3520fc99ff
SHA256b1d3b6b3cdeb5b7b8187767cd86100b76233e7bbb9acf56c64f8288f34b269ca
SHA512ca254231f12bdfc300712a37d31777ff9d3aa990ccc129129fa724b034f3b59c88ed5006a5f057348fa09a7de4a0c2e0fb479ce06556e2059f919ddd037f239e
-
Filesize
85KB
MD5a49c5f406456b79254eb65d015b81088
SHA1cfc2a2a89c63df52947af3610e4d9b8999399c91
SHA256ce4ef8ed1e72c1d3a6082d500a17a009eb6e8ed15022bf3b68a22291858feced
SHA512bbafeff8c101c7425dc9b8789117fe4c5e516d217181d3574d9d81b8fec4b0bd34f1e1fe6e406ae95584dc671f788cd7b05c8d700baf59fbf21de9c902edf7ae
-
Filesize
124KB
MD5291a0a9b63bae00a4222a6df71a22023
SHA17a6a2aad634ec30e8edb2d2d8d0895c708d84551
SHA256820e840759eed12e19f3c485fd819b065b49d9dc704ae3599a63077416d63324
SHA512d43ef6fc2595936b17b0a689a00be04968f11d7c28945af4c3a74589bd05f415bf4cb3b4e22ac496490daff533755999a69d5962ccffd12e09c16130ed57fd09
-
Filesize
46KB
MD55e5af52f42eaf007e3ac73fd2211f048
SHA11a981e66ab5b03f4a74a6bac6227cd45df78010b
SHA256a30cf1a40e0b09610e34be187f1396ac5a44dcfb27bc7ff9b450d1318b694c1b
SHA512bc37625005c3dad1129b158a2f1e91628d5c973961e0efd61513bb6c7b97d77922809afca8039d08c11903734450bc098c6e7b63655ff1e9881323e5cfd739fd
-
Filesize
159KB
MD5cf9fd17b1706f3044a8f74f6d398d5f1
SHA1c5cd0debbde042445b9722a676ff36a0ac3959ad
SHA2569209ccc60115727b192bf7771551040ca6fdd50f9bf8c3d2eacbfd424e8245e4
SHA5125fe922c00c6f7fd3cd9bc56fc51de1f44adffbdb0afc0583f1bb08008be628b9ac16f8560b0c3ba16138e1cdcaf1c525ef24241bed804804cdeb5961aed6385a
-
Filesize
78KB
MD54827652de133c83fa1cae839b361856c
SHA1182f9a04bdc42766cfd5fb352f2cb22e5c26665e
SHA25687832a3b89e2ada8f704a8f066013660d591d9ce01ce901cc57a3b973f0858ba
SHA5128d66d68613fdba0820257550de3c39b308b1dce659dca953d10a95ff2cf89c31afe512d30ed44422b31117058dc9fa15279e5ac84694da89b47f99b0ad7e338a
-
Filesize
18KB
MD5785045f8b25cd2e937ddc6b09debe01a
SHA1029c678674f482ababe8bbfdb93152392457109d
SHA25637073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba
SHA51240bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9
-
Filesize
36KB
MD59accebd928a8926fecf317f53cd1c44e
SHA1d7d71135cc3cf7320f8e63cefb6298dd44e5b1d4
SHA256811e5d65df60dfb8c6e1713da708be16d9a13ef8dfcd1022d8d1dda52ed057b2
SHA5122563402cc8e1402d9ac3a76a72b7dab0baa4ecd03629cc350e7199c7e1e1da4000e665bd02ac3a75fd9883fa678b924c8b73d88d8c50bf9d2ae59254a057911e
-
Filesize
824KB
MD535cd9399c279aab402d2285429b666ac
SHA19882206919c386d399cb0af53f4f89cf3ab9ed68
SHA256ff2a2d425b9e5ea63934f72adad3a53e9e61174a235af0f61a83816d3c5cabc6
SHA5121652a829c6f45f2cf53d42e9ff4ad8f5e007856fd784e854a9f02d3367e509f734fa2bd1d1d387f074d51dfde132511b338c4ba9ecf3a742acd908891a4e944d
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
33KB
MD5aed42ff110a595753bb2f83171727285
SHA1492ab23acf2cf384183f0a4c0716c0871b597bf5
SHA256a124932386dbcc5e6b5901f2460f68e7cfb1dff1406cd899620e8880461c60fb
SHA5126ba035f8d3c719adcd99f28f8b6e8e10fab15ea11f7e6753a3c1119221bffb070ccbf9ed68e1053fc55a9cd68d17ec240fb83a35fb2dd0029f256a6626eb3d21
-
Filesize
1KB
MD5af1905dc8bd39d2d407f12fb08272beb
SHA13f512317103d610146318aa6dd629f534647fa1e
SHA256bb113a896a43cb1b03a8b57a85e8d46faf39fe4ae4af97581b264415ef32bd3b
SHA5129b1f9262410ea87726587d8531f8fbe0562b54e56d66b66ac7d52bdd37c6562fcbbb11e71a4c778605beedbe89d7196f15341687964b497b7efd513c7895652e
-
Filesize
4.0MB
MD526ba25d468a778d37f1a24f4514d9814
SHA1b64fe169690557656ede3ae50d3c5a197fea6013
SHA2562f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128
SHA51280471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080
-
Filesize
4.8MB
MD56e4421d0c8e459b2b378ea968510182e
SHA18bb44092d97898424c2afb30e5db11a2cbb70acd
SHA25663534bf58d0657aee6def9711bd75310fc58724bda6200f34a11df0de9f49f96
SHA5128f4ae909f1992e10cb88dda6b023a15b3e23543f6345853588a678b7354890d4979c1f4ddc69c1ae66ac486bab284d1fbbe369b19b8097c61bc38fcd24a08dfb
-
Filesize
5KB
MD53e3b30da6cc5283f8716e0fe2eabee5e
SHA18d70d981bb7a68f08920913b12eac31372470ba5
SHA2566c9dd5bb8c4c7b8e55c538d0d77937e6a1edb0d7ceed1b3340ba6f053a729f82
SHA51249423575a64a34ac0d106b0d406e64da287bd651a771b637eee49442ed7c88265b2555bbbbeecadacad57bfcf565ab2b98a3dfa78a67269b4aa10034ee7f4c37
-
Filesize
27KB
MD5e21cff76db11c1066fd96af86332b640
SHA1e78ef7075c479b1d218132d89bf4bec13d54c06a
SHA256fcc2e09a2355a5546922874fb4cac92ee00a33c0ed6adbc440d128d1e9f4ec28
SHA512e86dba2326ca5ea3f5ef3af2abd3c23d5b29b6211acc865b6be5a51d5c8850b7cda8c069e6f631ac62f2047224c4b675bbe6ac97c7ba781de5b8016ebaffd46f
-
Filesize
1KB
MD5596866dc4485091a5f124f2809e9be67
SHA1fe238fbd9dd8247b092712ab320ba304515a67de
SHA256ab3993b6d78b0dfad3a288d7edb6d04f7580aac6702af3bd6bd2cf9f4f91d8aa
SHA51212f4e5e89b8531e290b0f240906a861305ba10ade8aa0dfb358c4115924774f8518ba342d5ebc4a8fdbd9fed0f5bb37f6949f59950b22c9453fc35e96fcb1e7e
-
Filesize
1.0MB
MD5601aee84e12b87ca66826dfc7ca57231
SHA13a7812433ca7d443d4494446a9ced24b6774ceca
SHA256d8091e62c74e1b2b648086f778c3c41ce01f09661a75ea207d3fea2cf26a8762
SHA5127c2d64623c6cfd66d6729f59909c90aa944e810ff6514c58b2b3142ee90e8660b7ddf7fa187389dd333e47efe8b19e935dd4e9119c15375b69b4880d043877d7
-
Filesize
228KB
MD54d867033b27c8a603de4885b449c4923
SHA1f1ace1a241bab6efb3c7059a68b6e9bbe258da83
SHA25622a2484d7fa799e6e71e310141614884f3bc8dad8ac749b6f1c475b5398a72f3
SHA512b5d6d4a58d8780a43e69964f80525905224fa020c0032e637cd25557097e331f63d156cceaaacfe1a692ca8cea8d8bd1b219468b6b8e4827c90febe1535a5702
-
Filesize
165KB
MD581a45f1a91448313b76d2e6d5308aa7a
SHA10d615343d5de03da03bce52e11b233093b404083
SHA256fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd
SHA512675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d
-
Filesize
824KB
MD509f7062e078379845347034c2a63943e
SHA19683dd8ef7d72101674850f3db0e05c14039d5fd
SHA2567c1c73de4909d11efb20028f4745a9c8494fb4ee8dcf2f049907115def3d2629
SHA512a169825e9b0bb995a115134cf1f7b76a96b651acd472dc4ce8473900d8852fc93b9f87a26d2c64f7bb3dd76d5feb01eeb4af4945e0c0b95d5c9c97938fa85b34
-
Filesize
1KB
MD5071849d4a7507c69e72d2dac6148f580
SHA169076b8454a309f9c6d0252106f7e90f845be851
SHA2565c8a028bda7c04f3f907461c23d987bc0a497bba0bf120f85dc35c895a0d8a28
SHA5124a79f1cb80d036cf5571e219c1657e7c3b06ab27cc70470476f614b22a65564c63aa48c5d953fe98fdd4478255e02eb9b1537d3ddf5b21417a4f506391aef70d