Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
-
Size
313KB
-
MD5
54c1677a604fe3d1ea9f7e597cc74b1e
-
SHA1
7710ec4d4067abc33c5f33c68b59c3d9eaeb0693
-
SHA256
f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0
-
SHA512
f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441
-
SSDEEP
3072:Kwrtf8H+INt2Q8fUIS7lYwqPF3vXN+h4QYouDwdMGdThD:Ky+eINt2RfU9lYRPF3vU4QYHDwdFdTR
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.6oifgr.win/3AD8-28A4-8276-0291-2BDE
http://cerberhhyed5frqa.xo59ok.win/3AD8-28A4-8276-0291-2BDE
http://cerberhhyed5frqa.zx34jk.win/3AD8-28A4-8276-0291-2BDE
http://cerberhhyed5frqa.rt4e34.win/3AD8-28A4-8276-0291-2BDE
http://cerberhhyed5frqa.as13fd.win/3AD8-28A4-8276-0291-2BDE
http://cerberhhyed5frqa.onion/3AD8-28A4-8276-0291-2BDE
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" odbcconf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation odbcconf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\odbcconf.lnk 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\odbcconf.lnk odbcconf.exe -
Executes dropped EXE 1 IoCs
pid Process 3876 odbcconf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odbcconf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odbcconf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odbcconf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" odbcconf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odbcconf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" odbcconf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp10B0.bmp" odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1308 cmd.exe 1784 PING.EXE 5916 cmd.exe 6024 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2552 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2288 taskkill.exe 5980 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop odbcconf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\odbcconf.exe\"" odbcconf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings odbcconf.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 6024 PING.EXE 1784 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 3876 odbcconf.exe 4064 msedge.exe 4064 msedge.exe 220 msedge.exe 220 msedge.exe 2340 identity_helper.exe 2340 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Token: SeDebugPrivilege 3876 odbcconf.exe Token: SeDebugPrivilege 2288 taskkill.exe Token: SeBackupPrivilege 2756 vssvc.exe Token: SeRestorePrivilege 2756 vssvc.exe Token: SeAuditPrivilege 2756 vssvc.exe Token: SeIncreaseQuotaPrivilege 5004 wmic.exe Token: SeSecurityPrivilege 5004 wmic.exe Token: SeTakeOwnershipPrivilege 5004 wmic.exe Token: SeLoadDriverPrivilege 5004 wmic.exe Token: SeSystemProfilePrivilege 5004 wmic.exe Token: SeSystemtimePrivilege 5004 wmic.exe Token: SeProfSingleProcessPrivilege 5004 wmic.exe Token: SeIncBasePriorityPrivilege 5004 wmic.exe Token: SeCreatePagefilePrivilege 5004 wmic.exe Token: SeBackupPrivilege 5004 wmic.exe Token: SeRestorePrivilege 5004 wmic.exe Token: SeShutdownPrivilege 5004 wmic.exe Token: SeDebugPrivilege 5004 wmic.exe Token: SeSystemEnvironmentPrivilege 5004 wmic.exe Token: SeRemoteShutdownPrivilege 5004 wmic.exe Token: SeUndockPrivilege 5004 wmic.exe Token: SeManageVolumePrivilege 5004 wmic.exe Token: 33 5004 wmic.exe Token: 34 5004 wmic.exe Token: 35 5004 wmic.exe Token: 36 5004 wmic.exe Token: SeIncreaseQuotaPrivilege 5004 wmic.exe Token: SeSecurityPrivilege 5004 wmic.exe Token: SeTakeOwnershipPrivilege 5004 wmic.exe Token: SeLoadDriverPrivilege 5004 wmic.exe Token: SeSystemProfilePrivilege 5004 wmic.exe Token: SeSystemtimePrivilege 5004 wmic.exe Token: SeProfSingleProcessPrivilege 5004 wmic.exe Token: SeIncBasePriorityPrivilege 5004 wmic.exe Token: SeCreatePagefilePrivilege 5004 wmic.exe Token: SeBackupPrivilege 5004 wmic.exe Token: SeRestorePrivilege 5004 wmic.exe Token: SeShutdownPrivilege 5004 wmic.exe Token: SeDebugPrivilege 5004 wmic.exe Token: SeSystemEnvironmentPrivilege 5004 wmic.exe Token: SeRemoteShutdownPrivilege 5004 wmic.exe Token: SeUndockPrivilege 5004 wmic.exe Token: SeManageVolumePrivilege 5004 wmic.exe Token: 33 5004 wmic.exe Token: 34 5004 wmic.exe Token: 35 5004 wmic.exe Token: 36 5004 wmic.exe Token: 33 3960 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3960 AUDIODG.EXE Token: SeDebugPrivilege 5980 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3876 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 85 PID 5112 wrote to memory of 3876 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 85 PID 5112 wrote to memory of 3876 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 85 PID 5112 wrote to memory of 1308 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 86 PID 5112 wrote to memory of 1308 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 86 PID 5112 wrote to memory of 1308 5112 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 86 PID 1308 wrote to memory of 2288 1308 cmd.exe 88 PID 1308 wrote to memory of 2288 1308 cmd.exe 88 PID 1308 wrote to memory of 2288 1308 cmd.exe 88 PID 3876 wrote to memory of 2552 3876 odbcconf.exe 89 PID 3876 wrote to memory of 2552 3876 odbcconf.exe 89 PID 1308 wrote to memory of 1784 1308 cmd.exe 93 PID 1308 wrote to memory of 1784 1308 cmd.exe 93 PID 1308 wrote to memory of 1784 1308 cmd.exe 93 PID 3876 wrote to memory of 5004 3876 odbcconf.exe 95 PID 3876 wrote to memory of 5004 3876 odbcconf.exe 95 PID 3876 wrote to memory of 220 3876 odbcconf.exe 109 PID 3876 wrote to memory of 220 3876 odbcconf.exe 109 PID 220 wrote to memory of 4828 220 msedge.exe 111 PID 220 wrote to memory of 4828 220 msedge.exe 111 PID 3876 wrote to memory of 2236 3876 odbcconf.exe 110 PID 3876 wrote to memory of 2236 3876 odbcconf.exe 110 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4060 220 msedge.exe 112 PID 220 wrote to memory of 4064 220 msedge.exe 113 PID 220 wrote to memory of 4064 220 msedge.exe 113 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\odbcconf.exe"C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\odbcconf.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2552
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8afa46f8,0x7ffa8afa4708,0x7ffa8afa47184⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:24⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:84⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:14⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:14⤵PID:164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:14⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:84⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:14⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:14⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:14⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:14⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,17528701675108856026,11693516597882076978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:14⤵PID:3800
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.6oifgr.win/3AD8-28A4-8276-0291-2BDE3⤵PID:2176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa8afa46f8,0x7ffa8afa4708,0x7ffa8afa47184⤵PID:1440
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1720
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "odbcconf.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\odbcconf.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5916 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "odbcconf.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5980
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6024
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1784
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e8 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3960
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD54d60bf66d8bcd689c98cc26e78d59209
SHA134d85479c3145435eeceffcc8de30cd089cb363e
SHA2568e1e01be9d1978eb29b2405330ada2a9985f7da0306655d5054aa8058881a695
SHA512a5034b732a766b79210d2e73dfefdf1a0f415017b34943dc23ead70e85c8dac7d596c9b449272fa7470e67d8793ed8f941cc1556bd071c1e43db3958b770c685
-
Filesize
85B
MD52b09c2f35656c265a57bd90e1b4501eb
SHA11c6fcc8a469c2413f29503e63a1bee213f39f318
SHA25697b2260a141f1388af39b3f9bc6e6be276ebc55d8e43def3925c134789cdacc5
SHA512c098f031b59005f5d8395c3dd41f6531cde4227f171647e7c9e67dd541699b8ebc223a399ee78d63c667387f6c7a56f041c19855b7b5b5e96a371c99b7bb550b
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD5806995301f8ab55349ede24346da79b5
SHA1d47f8960f12ea602cabd2e67f34a287b3e71acef
SHA2569d38e8d7cbabb5e231b639bcea8ea60a9b59a540631d2aa94ab23a906bd88cac
SHA512214d5054b4d651fb54d75d90e85a261003f40f58ead702c712a4f1212a5b354ec64f5ec3855558f163272e20b8590f5396be2fc2c3ee25bb3b530f8b67d8d181
-
Filesize
6KB
MD546e2ce316b7b343a9a997ec333e3cdf6
SHA145669a76e1b7a6aac52cf34a051a973445dbcc60
SHA256da93b75bd5046dfa2d630f093e566002c15f8b8fbd5ac308dd1ffcd1b5d152cf
SHA51271b8069d26a2f38548bd83021dd9dc2745cae701bc6ef0933d4fb7ed3f0b4b841c2ddf335ed69f0dd9f672bf59de00ec1a647d7675696681250cbbbe83ced19d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542692a267e24ed771bcd574b62e74042
SHA192c0052691c3217041750c0ec3a8c814aab061c9
SHA2568078a1d6d786449d35e050b060fe497ca466be82d7893ea051905a00625a3202
SHA5127c6acaceeb65cd862e4e63f84ae36d052059801188125a85417ced0a8a030e6818deb09baab2d350ae8a0742b6bc6ce56ca5dabd19d2d1b45297187b5bdd14f3
-
Filesize
1KB
MD53f952edf7ac99b19243212fc30404ffd
SHA15ebb167353f6d74600054e364fbde6192966065c
SHA256cbd4ebb9f57015c23b359f53d71bd65180a4bfb069e6f7db10dfe9c3c27b932e
SHA5127db72498244a6f7f8dbb7845f7cc5b7442654915ac0dd94c1a0f549d47b02ee8d00f46bd5ebf125115641c0bffeab1feb8625851d83d54339fe0527951fad6f6
-
Filesize
313KB
MD554c1677a604fe3d1ea9f7e597cc74b1e
SHA17710ec4d4067abc33c5f33c68b59c3d9eaeb0693
SHA256f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0
SHA512f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441
-
Filesize
12KB
MD5ca886bf1a3e68edffe2e265d8149b459
SHA103728e5f1c654ed04853e9d44cd08503901f9b46
SHA25624975757b77b1b371c89ac2002871dad7e2d64d72acb10daca49e817d9917210
SHA51223bfed73b6a90f89891c05657f54e86af818b85a54a2af43b04265f64589b67602cf4abf3933c53a8183b367e8b918c16620e619a797d3ced29053164b8457c1