Analysis
-
max time kernel
31s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 23:18
Behavioral task
behavioral1
Sample
larksharp.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
larksharp.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
larksharp.exe
-
Size
10.0MB
-
MD5
1e61aac32833d7e38884ae4df8e9748e
-
SHA1
b2f17de7878360c69f6c103cfb0d2f77c530cd39
-
SHA256
eb04c7fde0ba573eae3e9307a3c91613e2eb4c41e97e0ad7a3979d2ac0e1dff1
-
SHA512
947758430b35760ac87cacf9ba42c04b13628b67c9ce1bd866cb362021537f10f99869c73c62cbf7cf177fa2da285ebce11e23688e79eda22b157fa47ef9bd01
-
SSDEEP
196608:v6Dg6CsXDjDVdJolpPgToa10/inHu7eu0jr5MJLheXAxFg6XVnZ+YtlBGFOnJBDP:SE6CED/J83a10anHKeT/5QKAHBlZ7l4C
Malware Config
Signatures
-
Cerber 42 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 5068 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE -
Cerber family
-
Executes dropped EXE 64 IoCs
pid Process 3452 randomizer.exe 1692 randomizer.exe 3628 AMIDEWINx64.EXE 4476 AMIDEWINx64.EXE 3480 AMIDEWINx64.EXE 3976 AMIDEWINx64.EXE 3704 AMIDEWINx64.EXE 1676 AMIDEWINx64.EXE 1520 AMIDEWINx64.EXE 2740 AMIDEWINx64.EXE 1016 AMIDEWINx64.EXE 244 AMIDEWINx64.EXE 2164 AMIDEWINx64.EXE 2196 AMIDEWINx64.EXE 4888 AMIDEWINx64.EXE 1648 AMIDEWINx64.EXE 2616 AMIDEWINx64.EXE 2548 AMIDEWINx64.EXE 4144 AMIDEWINx64.EXE 1472 AMIDEWINx64.EXE 3212 AMIDEWINx64.EXE 4760 AMIDEWINx64.EXE 404 AMIDEWINx64.EXE 3360 AMIDEWINx64.EXE 2172 AMIDEWINx64.EXE 2204 AMIDEWINx64.EXE 3980 AMIDEWINx64.EXE 4752 AMIDEWINx64.EXE 880 AMIDEWINx64.EXE 4040 AMIDEWINx64.EXE 4892 AMIDEWINx64.EXE 2016 AMIDEWINx64.EXE 1600 AMIDEWINx64.EXE 4552 AMIDEWINx64.EXE 4472 AMIDEWINx64.EXE 1384 AMIDEWINx64.EXE 3768 AMIDEWINx64.EXE 1792 AMIDEWINx64.EXE 2508 AMIDEWINx64.EXE 2500 AMIDEWINx64.EXE 5044 AMIDEWINx64.EXE 3816 AMIDEWINx64.EXE 4132 AMIDEWINx64.EXE 2488 mac.exe 3452 randomizer.exe 1692 randomizer.exe 3628 AMIDEWINx64.EXE 4476 AMIDEWINx64.EXE 3480 AMIDEWINx64.EXE 3976 AMIDEWINx64.EXE 3704 AMIDEWINx64.EXE 1676 AMIDEWINx64.EXE 1520 AMIDEWINx64.EXE 2740 AMIDEWINx64.EXE 1016 AMIDEWINx64.EXE 244 AMIDEWINx64.EXE 2164 AMIDEWINx64.EXE 2196 AMIDEWINx64.EXE 4888 AMIDEWINx64.EXE 1648 AMIDEWINx64.EXE 2616 AMIDEWINx64.EXE 2548 AMIDEWINx64.EXE 4144 AMIDEWINx64.EXE 1472 AMIDEWINx64.EXE -
Loads dropped DLL 24 IoCs
pid Process 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 1692 randomizer.exe 1692 randomizer.exe 2488 mac.exe 2488 mac.exe 2488 mac.exe 2488 mac.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 3560 larksharp.exe 1692 randomizer.exe 1692 randomizer.exe 2488 mac.exe 2488 mac.exe 2488 mac.exe 2488 mac.exe -
Kills process with taskkill 1 IoCs
pid Process 5068 taskkill.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5068 taskkill.exe Token: SeIncreaseQuotaPrivilege 1720 WMIC.exe Token: SeSecurityPrivilege 1720 WMIC.exe Token: SeTakeOwnershipPrivilege 1720 WMIC.exe Token: SeLoadDriverPrivilege 1720 WMIC.exe Token: SeSystemProfilePrivilege 1720 WMIC.exe Token: SeSystemtimePrivilege 1720 WMIC.exe Token: SeProfSingleProcessPrivilege 1720 WMIC.exe Token: SeIncBasePriorityPrivilege 1720 WMIC.exe Token: SeCreatePagefilePrivilege 1720 WMIC.exe Token: SeBackupPrivilege 1720 WMIC.exe Token: SeRestorePrivilege 1720 WMIC.exe Token: SeShutdownPrivilege 1720 WMIC.exe Token: SeDebugPrivilege 1720 WMIC.exe Token: SeSystemEnvironmentPrivilege 1720 WMIC.exe Token: SeRemoteShutdownPrivilege 1720 WMIC.exe Token: SeUndockPrivilege 1720 WMIC.exe Token: SeManageVolumePrivilege 1720 WMIC.exe Token: 33 1720 WMIC.exe Token: 34 1720 WMIC.exe Token: 35 1720 WMIC.exe Token: 36 1720 WMIC.exe Token: SeIncreaseQuotaPrivilege 1720 WMIC.exe Token: SeSecurityPrivilege 1720 WMIC.exe Token: SeTakeOwnershipPrivilege 1720 WMIC.exe Token: SeLoadDriverPrivilege 1720 WMIC.exe Token: SeSystemProfilePrivilege 1720 WMIC.exe Token: SeSystemtimePrivilege 1720 WMIC.exe Token: SeProfSingleProcessPrivilege 1720 WMIC.exe Token: SeIncBasePriorityPrivilege 1720 WMIC.exe Token: SeCreatePagefilePrivilege 1720 WMIC.exe Token: SeBackupPrivilege 1720 WMIC.exe Token: SeRestorePrivilege 1720 WMIC.exe Token: SeShutdownPrivilege 1720 WMIC.exe Token: SeDebugPrivilege 1720 WMIC.exe Token: SeSystemEnvironmentPrivilege 1720 WMIC.exe Token: SeRemoteShutdownPrivilege 1720 WMIC.exe Token: SeUndockPrivilege 1720 WMIC.exe Token: SeManageVolumePrivilege 1720 WMIC.exe Token: 33 1720 WMIC.exe Token: 34 1720 WMIC.exe Token: 35 1720 WMIC.exe Token: 36 1720 WMIC.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeIncreaseQuotaPrivilege 1720 WMIC.exe Token: SeSecurityPrivilege 1720 WMIC.exe Token: SeTakeOwnershipPrivilege 1720 WMIC.exe Token: SeLoadDriverPrivilege 1720 WMIC.exe Token: SeSystemProfilePrivilege 1720 WMIC.exe Token: SeSystemtimePrivilege 1720 WMIC.exe Token: SeProfSingleProcessPrivilege 1720 WMIC.exe Token: SeIncBasePriorityPrivilege 1720 WMIC.exe Token: SeCreatePagefilePrivilege 1720 WMIC.exe Token: SeBackupPrivilege 1720 WMIC.exe Token: SeRestorePrivilege 1720 WMIC.exe Token: SeShutdownPrivilege 1720 WMIC.exe Token: SeDebugPrivilege 1720 WMIC.exe Token: SeSystemEnvironmentPrivilege 1720 WMIC.exe Token: SeRemoteShutdownPrivilege 1720 WMIC.exe Token: SeUndockPrivilege 1720 WMIC.exe Token: SeManageVolumePrivilege 1720 WMIC.exe Token: 33 1720 WMIC.exe Token: 34 1720 WMIC.exe Token: 35 1720 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3560 2144 larksharp.exe 85 PID 2144 wrote to memory of 3560 2144 larksharp.exe 85 PID 3560 wrote to memory of 232 3560 larksharp.exe 89 PID 3560 wrote to memory of 232 3560 larksharp.exe 89 PID 232 wrote to memory of 3352 232 cmd.exe 90 PID 232 wrote to memory of 3352 232 cmd.exe 90 PID 3560 wrote to memory of 5068 3560 larksharp.exe 99 PID 3560 wrote to memory of 5068 3560 larksharp.exe 99 PID 3560 wrote to memory of 3452 3560 larksharp.exe 101 PID 3560 wrote to memory of 3452 3560 larksharp.exe 101 PID 3452 wrote to memory of 1692 3452 randomizer.exe 103 PID 3452 wrote to memory of 1692 3452 randomizer.exe 103 PID 3560 wrote to memory of 3600 3560 larksharp.exe 105 PID 3560 wrote to memory of 3600 3560 larksharp.exe 105 PID 3600 wrote to memory of 2432 3600 cmd.exe 107 PID 3600 wrote to memory of 2432 3600 cmd.exe 107 PID 2432 wrote to memory of 3628 2432 cmd.exe 108 PID 2432 wrote to memory of 3628 2432 cmd.exe 108 PID 2432 wrote to memory of 4476 2432 cmd.exe 109 PID 2432 wrote to memory of 4476 2432 cmd.exe 109 PID 2432 wrote to memory of 3480 2432 cmd.exe 110 PID 2432 wrote to memory of 3480 2432 cmd.exe 110 PID 2432 wrote to memory of 3976 2432 cmd.exe 111 PID 2432 wrote to memory of 3976 2432 cmd.exe 111 PID 2432 wrote to memory of 3704 2432 cmd.exe 112 PID 2432 wrote to memory of 3704 2432 cmd.exe 112 PID 2432 wrote to memory of 1676 2432 cmd.exe 113 PID 2432 wrote to memory of 1676 2432 cmd.exe 113 PID 2432 wrote to memory of 1520 2432 cmd.exe 114 PID 2432 wrote to memory of 1520 2432 cmd.exe 114 PID 2432 wrote to memory of 2740 2432 cmd.exe 115 PID 2432 wrote to memory of 2740 2432 cmd.exe 115 PID 2432 wrote to memory of 1016 2432 cmd.exe 116 PID 2432 wrote to memory of 1016 2432 cmd.exe 116 PID 2432 wrote to memory of 244 2432 cmd.exe 117 PID 2432 wrote to memory of 244 2432 cmd.exe 117 PID 2432 wrote to memory of 2164 2432 cmd.exe 118 PID 2432 wrote to memory of 2164 2432 cmd.exe 118 PID 2432 wrote to memory of 2196 2432 cmd.exe 119 PID 2432 wrote to memory of 2196 2432 cmd.exe 119 PID 2432 wrote to memory of 4888 2432 cmd.exe 120 PID 2432 wrote to memory of 4888 2432 cmd.exe 120 PID 2432 wrote to memory of 1648 2432 cmd.exe 121 PID 2432 wrote to memory of 1648 2432 cmd.exe 121 PID 2432 wrote to memory of 2616 2432 cmd.exe 122 PID 2432 wrote to memory of 2616 2432 cmd.exe 122 PID 2432 wrote to memory of 2548 2432 cmd.exe 123 PID 2432 wrote to memory of 2548 2432 cmd.exe 123 PID 2432 wrote to memory of 4144 2432 cmd.exe 124 PID 2432 wrote to memory of 4144 2432 cmd.exe 124 PID 2432 wrote to memory of 1472 2432 cmd.exe 125 PID 2432 wrote to memory of 1472 2432 cmd.exe 125 PID 2432 wrote to memory of 3212 2432 cmd.exe 126 PID 2432 wrote to memory of 3212 2432 cmd.exe 126 PID 2432 wrote to memory of 4760 2432 cmd.exe 127 PID 2432 wrote to memory of 4760 2432 cmd.exe 127 PID 2432 wrote to memory of 404 2432 cmd.exe 128 PID 2432 wrote to memory of 404 2432 cmd.exe 128 PID 2432 wrote to memory of 3360 2432 cmd.exe 129 PID 2432 wrote to memory of 3360 2432 cmd.exe 129 PID 2432 wrote to memory of 2172 2432 cmd.exe 130 PID 2432 wrote to memory of 2172 2432 cmd.exe 130 PID 2432 wrote to memory of 2204 2432 cmd.exe 131 PID 2432 wrote to memory of 2204 2432 cmd.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\larksharp.exe"C:\Users\Admin\AppData\Local\Temp\larksharp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\larksharp.exe"C:\Users\Admin\AppData\Local\Temp\larksharp.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con: cols=110 lines=303⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\mode.commode con: cols=110 lines=304⤵PID:3352
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM explorer.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\randomizer.exeC:\Users\Admin\AppData\Roaming\tmp9pjrglg6\randomizer.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\randomizer.exeC:\Users\Admin\AppData\Roaming\tmp9pjrglg6\randomizer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c "C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\spoof.bat >nul 2>&1""3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\cmd.execmd.exe /c "C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\spoof.bat >nul 2>&1"4⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /ID 07/03/20205⤵
- Cerber
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV HCcc7xTsCmX8UkX5⤵
- Cerber
- Executes dropped EXE
PID:4476
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS bwHQu0ZaHldEv4g5⤵
- Cerber
- Executes dropped EXE
PID:3480
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF c3sMH73AxM5lH1u5⤵
- Cerber
- Executes dropped EXE
PID:3976
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO5⤵
- Cerber
- Executes dropped EXE
PID:3704
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK iIjShpnDilWgMDB5⤵
- Cerber
- Executes dropped EXE
PID:1676
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF FjlKHaKkTFauqth5⤵
- Cerber
- Executes dropped EXE
PID:1520
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV XS6NDi8p8yD6s7z5⤵
- Cerber
- Executes dropped EXE
PID:2740
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS CMaZEsCFRJXAUxT5⤵
- Cerber
- Executes dropped EXE
PID:1016
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT XEMY8xxIrIBnqwZ5⤵
- Cerber
- Executes dropped EXE
PID:244
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC yXWfrSGbnjxVOUe5⤵
- Cerber
- Executes dropped EXE
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV igVVFJbhj2RNQCl5⤵
- Cerber
- Executes dropped EXE
PID:2196
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS iSHf6MpNMcmZ9GF5⤵
- Cerber
- Executes dropped EXE
PID:4888
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM bRJOLD8viYJQNpl5⤵
- Cerber
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA mikPlTaLtgRgZxP5⤵
- Cerber
- Executes dropped EXE
PID:2616
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK BrTBYhkk2T1WQZp5⤵
- Cerber
- Executes dropped EXE
PID:2548
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN qNVYM5OwgetDJuM5⤵
- Cerber
- Executes dropped EXE
PID:4144
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT Ria1FV1IJEDsNY55⤵
- Cerber
- Executes dropped EXE
PID:1472
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN xNApqeoOkYqqa085⤵
- Cerber
- Executes dropped EXE
PID:3212
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BSH 3 BfwkuyFcButivOp5⤵
- Cerber
- Executes dropped EXE
PID:4760
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BMH 3 WK2sDfEk6PLU4xw5⤵
- Cerber
- Executes dropped EXE
PID:404
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BPH 3 HNPLrjBdnagsbbW5⤵
- Cerber
- Executes dropped EXE
PID:3360
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BVH 3 CfrYswmNiw2Yk5a5⤵
- Cerber
- Executes dropped EXE
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSH 4 QY2hS1iVY0jIzjR5⤵
- Cerber
- Executes dropped EXE
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CMH 4 RPLooyFAJlBnvPG5⤵
- Cerber
- Executes dropped EXE
PID:3980
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CVH 4 mATMUc7IMaenQD65⤵
- Cerber
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CAH 4 bPkxAysSGTJykNU5⤵
- Cerber
- Executes dropped EXE
PID:880
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSKH 4 WuuIRymCiAvQD3K5⤵
- Cerber
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BTH 3 LZUAL6LyQVRzmKz5⤵
- Cerber
- Executes dropped EXE
PID:4892
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLCH 3 yt2dKsgoAV8cyzW5⤵
- Cerber
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /IVN xDml7I42QM2x9Rj5⤵
- Cerber
- Executes dropped EXE
PID:1600
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 3.1.75⤵
- Cerber
- Executes dropped EXE
PID:4552
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM n6WKjiqM7PuHKCL5⤵
- Cerber
- Executes dropped EXE
PID:4472
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP sJ8iUr5MfiMy8KX5⤵
- Cerber
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM HFcp9ioGw6VJgNI5⤵
- Cerber
- Executes dropped EXE
PID:3768
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP nAzD8stwP9kP8FR5⤵
- Cerber
- Executes dropped EXE
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /SCO 1 oNipAoF7nYFAlT35⤵
- Cerber
- Executes dropped EXE
PID:2508
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 1 xuL13vnq4TToxyI5⤵
- Cerber
- Executes dropped EXE
PID:2500
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 3 h3guYOqzkwNa6Ph5⤵
- Cerber
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 4 VH44nlXHAUseqGj5⤵
- Cerber
- Executes dropped EXE
PID:3816
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\AMIDEWINx64.EXEAMIDEWINx64.EXE /OS 5 J5xGaekFNlO3LDP5⤵
- Cerber
- Executes dropped EXE
PID:4132
-
-
-
-
C:\Users\Admin\AppData\Roaming\tmp9pjrglg6\mac.exeC:\Users\Admin\AppData\Roaming\tmp9pjrglg6\mac.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE >nul 2>&14⤵PID:4468
-
C:\Windows\System32\Wbem\WMIC.exeWMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD56bfe0519e242720f965bb1680356728c
SHA1f6a5392214ade1750af15fdcaa6f05bf8ee06f9e
SHA256a922b1906f9b04b582e8ace9a17e6b6d405df15f4ab30bdc55f2fc5df7a5c9c3
SHA512cf47a256fd970d1de50645c23fc68a18cec6873475e06d567d7ef065ea913d8ac98cc5e811113ff5c161786544898d03d375f683b1e31551e9dd41ac036433af
-
Filesize
561KB
MD572f3d84384e888bf0d38852eb863026b
SHA18e6a0257591eb913ae7d0e975c56306b3f680b3f
SHA256a4c2229bdc2a2a630acdc095b4d86008e5c3e3bc7773174354f3da4f5beb9cde
SHA5126d53634bc51bd383358e0d55988d70aee6ed3897bc6ae5e0d2413bed27ecff4c8092020682cd089859023b02d9a1858ac42e64d59c38ba90fbaf89b656c539a6
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
35KB
MD59cff894542dc399e0a46dee017331edf
SHA1d1e889d22a5311bd518517537ca98b3520fc99ff
SHA256b1d3b6b3cdeb5b7b8187767cd86100b76233e7bbb9acf56c64f8288f34b269ca
SHA512ca254231f12bdfc300712a37d31777ff9d3aa990ccc129129fa724b034f3b59c88ed5006a5f057348fa09a7de4a0c2e0fb479ce06556e2059f919ddd037f239e
-
Filesize
85KB
MD5a49c5f406456b79254eb65d015b81088
SHA1cfc2a2a89c63df52947af3610e4d9b8999399c91
SHA256ce4ef8ed1e72c1d3a6082d500a17a009eb6e8ed15022bf3b68a22291858feced
SHA512bbafeff8c101c7425dc9b8789117fe4c5e516d217181d3574d9d81b8fec4b0bd34f1e1fe6e406ae95584dc671f788cd7b05c8d700baf59fbf21de9c902edf7ae
-
Filesize
124KB
MD5291a0a9b63bae00a4222a6df71a22023
SHA17a6a2aad634ec30e8edb2d2d8d0895c708d84551
SHA256820e840759eed12e19f3c485fd819b065b49d9dc704ae3599a63077416d63324
SHA512d43ef6fc2595936b17b0a689a00be04968f11d7c28945af4c3a74589bd05f415bf4cb3b4e22ac496490daff533755999a69d5962ccffd12e09c16130ed57fd09
-
Filesize
46KB
MD55e5af52f42eaf007e3ac73fd2211f048
SHA11a981e66ab5b03f4a74a6bac6227cd45df78010b
SHA256a30cf1a40e0b09610e34be187f1396ac5a44dcfb27bc7ff9b450d1318b694c1b
SHA512bc37625005c3dad1129b158a2f1e91628d5c973961e0efd61513bb6c7b97d77922809afca8039d08c11903734450bc098c6e7b63655ff1e9881323e5cfd739fd
-
Filesize
159KB
MD5cf9fd17b1706f3044a8f74f6d398d5f1
SHA1c5cd0debbde042445b9722a676ff36a0ac3959ad
SHA2569209ccc60115727b192bf7771551040ca6fdd50f9bf8c3d2eacbfd424e8245e4
SHA5125fe922c00c6f7fd3cd9bc56fc51de1f44adffbdb0afc0583f1bb08008be628b9ac16f8560b0c3ba16138e1cdcaf1c525ef24241bed804804cdeb5961aed6385a
-
Filesize
78KB
MD54827652de133c83fa1cae839b361856c
SHA1182f9a04bdc42766cfd5fb352f2cb22e5c26665e
SHA25687832a3b89e2ada8f704a8f066013660d591d9ce01ce901cc57a3b973f0858ba
SHA5128d66d68613fdba0820257550de3c39b308b1dce659dca953d10a95ff2cf89c31afe512d30ed44422b31117058dc9fa15279e5ac84694da89b47f99b0ad7e338a
-
Filesize
18KB
MD5785045f8b25cd2e937ddc6b09debe01a
SHA1029c678674f482ababe8bbfdb93152392457109d
SHA25637073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba
SHA51240bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9
-
Filesize
36KB
MD59accebd928a8926fecf317f53cd1c44e
SHA1d7d71135cc3cf7320f8e63cefb6298dd44e5b1d4
SHA256811e5d65df60dfb8c6e1713da708be16d9a13ef8dfcd1022d8d1dda52ed057b2
SHA5122563402cc8e1402d9ac3a76a72b7dab0baa4ecd03629cc350e7199c7e1e1da4000e665bd02ac3a75fd9883fa678b924c8b73d88d8c50bf9d2ae59254a057911e
-
Filesize
824KB
MD535cd9399c279aab402d2285429b666ac
SHA19882206919c386d399cb0af53f4f89cf3ab9ed68
SHA256ff2a2d425b9e5ea63934f72adad3a53e9e61174a235af0f61a83816d3c5cabc6
SHA5121652a829c6f45f2cf53d42e9ff4ad8f5e007856fd784e854a9f02d3367e509f734fa2bd1d1d387f074d51dfde132511b338c4ba9ecf3a742acd908891a4e944d
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
33KB
MD5aed42ff110a595753bb2f83171727285
SHA1492ab23acf2cf384183f0a4c0716c0871b597bf5
SHA256a124932386dbcc5e6b5901f2460f68e7cfb1dff1406cd899620e8880461c60fb
SHA5126ba035f8d3c719adcd99f28f8b6e8e10fab15ea11f7e6753a3c1119221bffb070ccbf9ed68e1053fc55a9cd68d17ec240fb83a35fb2dd0029f256a6626eb3d21
-
Filesize
1KB
MD5af1905dc8bd39d2d407f12fb08272beb
SHA13f512317103d610146318aa6dd629f534647fa1e
SHA256bb113a896a43cb1b03a8b57a85e8d46faf39fe4ae4af97581b264415ef32bd3b
SHA5129b1f9262410ea87726587d8531f8fbe0562b54e56d66b66ac7d52bdd37c6562fcbbb11e71a4c778605beedbe89d7196f15341687964b497b7efd513c7895652e
-
Filesize
4.0MB
MD526ba25d468a778d37f1a24f4514d9814
SHA1b64fe169690557656ede3ae50d3c5a197fea6013
SHA2562f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128
SHA51280471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080
-
Filesize
4.8MB
MD56e4421d0c8e459b2b378ea968510182e
SHA18bb44092d97898424c2afb30e5db11a2cbb70acd
SHA25663534bf58d0657aee6def9711bd75310fc58724bda6200f34a11df0de9f49f96
SHA5128f4ae909f1992e10cb88dda6b023a15b3e23543f6345853588a678b7354890d4979c1f4ddc69c1ae66ac486bab284d1fbbe369b19b8097c61bc38fcd24a08dfb
-
Filesize
5KB
MD53e3b30da6cc5283f8716e0fe2eabee5e
SHA18d70d981bb7a68f08920913b12eac31372470ba5
SHA2566c9dd5bb8c4c7b8e55c538d0d77937e6a1edb0d7ceed1b3340ba6f053a729f82
SHA51249423575a64a34ac0d106b0d406e64da287bd651a771b637eee49442ed7c88265b2555bbbbeecadacad57bfcf565ab2b98a3dfa78a67269b4aa10034ee7f4c37
-
Filesize
27KB
MD5e21cff76db11c1066fd96af86332b640
SHA1e78ef7075c479b1d218132d89bf4bec13d54c06a
SHA256fcc2e09a2355a5546922874fb4cac92ee00a33c0ed6adbc440d128d1e9f4ec28
SHA512e86dba2326ca5ea3f5ef3af2abd3c23d5b29b6211acc865b6be5a51d5c8850b7cda8c069e6f631ac62f2047224c4b675bbe6ac97c7ba781de5b8016ebaffd46f
-
Filesize
1KB
MD5596866dc4485091a5f124f2809e9be67
SHA1fe238fbd9dd8247b092712ab320ba304515a67de
SHA256ab3993b6d78b0dfad3a288d7edb6d04f7580aac6702af3bd6bd2cf9f4f91d8aa
SHA51212f4e5e89b8531e290b0f240906a861305ba10ade8aa0dfb358c4115924774f8518ba342d5ebc4a8fdbd9fed0f5bb37f6949f59950b22c9453fc35e96fcb1e7e
-
Filesize
1.0MB
MD5601aee84e12b87ca66826dfc7ca57231
SHA13a7812433ca7d443d4494446a9ced24b6774ceca
SHA256d8091e62c74e1b2b648086f778c3c41ce01f09661a75ea207d3fea2cf26a8762
SHA5127c2d64623c6cfd66d6729f59909c90aa944e810ff6514c58b2b3142ee90e8660b7ddf7fa187389dd333e47efe8b19e935dd4e9119c15375b69b4880d043877d7
-
Filesize
228KB
MD54d867033b27c8a603de4885b449c4923
SHA1f1ace1a241bab6efb3c7059a68b6e9bbe258da83
SHA25622a2484d7fa799e6e71e310141614884f3bc8dad8ac749b6f1c475b5398a72f3
SHA512b5d6d4a58d8780a43e69964f80525905224fa020c0032e637cd25557097e331f63d156cceaaacfe1a692ca8cea8d8bd1b219468b6b8e4827c90febe1535a5702
-
Filesize
165KB
MD581a45f1a91448313b76d2e6d5308aa7a
SHA10d615343d5de03da03bce52e11b233093b404083
SHA256fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd
SHA512675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d
-
Filesize
824KB
MD509f7062e078379845347034c2a63943e
SHA19683dd8ef7d72101674850f3db0e05c14039d5fd
SHA2567c1c73de4909d11efb20028f4745a9c8494fb4ee8dcf2f049907115def3d2629
SHA512a169825e9b0bb995a115134cf1f7b76a96b651acd472dc4ce8473900d8852fc93b9f87a26d2c64f7bb3dd76d5feb01eeb4af4945e0c0b95d5c9c97938fa85b34
-
Filesize
1KB
MD5ccbe5c34480b05d3215d28ea04c21067
SHA16f9669198128b32d9a9f67dda141e36bc331376d
SHA2569fb8271e9a441fedb4fc9cdfe0a48bf25359a2ab53027d4b47296c1063029278
SHA5126f233dc6763357cabcdadb4203e028bd449d2700e17d2d20eaaf521a2fe9a468038e9eb2a3549e772cf203d6bca5ef825d16e475cbbcc3fbd2a95062980ee546