Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/F0B1-8E48-EB5B-029E-DAD1
http://cerberhhyed5frqa.qor499.top/F0B1-8E48-EB5B-029E-DAD1
http://cerberhhyed5frqa.gkfit9.win/F0B1-8E48-EB5B-029E-DAD1
http://cerberhhyed5frqa.305iot.win/F0B1-8E48-EB5B-029E-DAD1
http://cerberhhyed5frqa.dkrti5.win/F0B1-8E48-EB5B-029E-DAD1
http://cerberhhyed5frqa.onion/F0B1-8E48-EB5B-029E-DAD1
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16401) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" wusa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wusa.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk wusa.exe -
Executes dropped EXE 3 IoCs
pid Process 2612 wusa.exe 2740 wusa.exe 1756 wusa.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" wusa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" wusa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3520.bmp" wusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 832 cmd.exe 2952 PING.EXE 6136 cmd.exe 2440 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 1488 taskkill.exe 1044 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop wusa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\wusa.exe\"" wusa.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings wusa.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2952 PING.EXE 2440 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe 2612 wusa.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Token: SeDebugPrivilege 2612 wusa.exe Token: SeDebugPrivilege 1488 taskkill.exe Token: SeDebugPrivilege 2740 wusa.exe Token: SeDebugPrivilege 1756 wusa.exe Token: 33 384 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 384 AUDIODG.EXE Token: SeDebugPrivilege 1044 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2612 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 4468 wrote to memory of 2612 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 4468 wrote to memory of 2612 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 4468 wrote to memory of 832 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 86 PID 4468 wrote to memory of 832 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 86 PID 4468 wrote to memory of 832 4468 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 86 PID 832 wrote to memory of 1488 832 cmd.exe 88 PID 832 wrote to memory of 1488 832 cmd.exe 88 PID 832 wrote to memory of 1488 832 cmd.exe 88 PID 832 wrote to memory of 2952 832 cmd.exe 90 PID 832 wrote to memory of 2952 832 cmd.exe 90 PID 832 wrote to memory of 2952 832 cmd.exe 90 PID 2612 wrote to memory of 1100 2612 wusa.exe 113 PID 2612 wrote to memory of 1100 2612 wusa.exe 113 PID 1100 wrote to memory of 1544 1100 msedge.exe 114 PID 1100 wrote to memory of 1544 1100 msedge.exe 114 PID 2612 wrote to memory of 2732 2612 wusa.exe 115 PID 2612 wrote to memory of 2732 2612 wusa.exe 115 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 4220 1100 msedge.exe 116 PID 1100 wrote to memory of 2804 1100 msedge.exe 117 PID 1100 wrote to memory of 2804 1100 msedge.exe 117 PID 1100 wrote to memory of 4292 1100 msedge.exe 118 PID 1100 wrote to memory of 4292 1100 msedge.exe 118 PID 1100 wrote to memory of 4292 1100 msedge.exe 118 PID 1100 wrote to memory of 4292 1100 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exe"C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe301046f8,0x7ffe30104708,0x7ffe301047184⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:24⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:84⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:14⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:14⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:14⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:84⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:84⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:14⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:14⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:14⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9834731467456502117,8209978555734642769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:14⤵PID:5452
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/F0B1-8E48-EB5B-029E-DAD13⤵PID:908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe301046f8,0x7ffe30104708,0x7ffe301047184⤵PID:1624
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3988
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "wusa.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6136 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "wusa.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2440
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2952
-
-
-
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exeC:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exeC:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\wusa.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x464 0x40c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:384
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5846deb2e41114f5fe41e688c8b9fbd6a
SHA15e65f349c694f1198ec32959c0c35a474185c699
SHA256d54bf2ac8e334718bf063193e26425d5a0175098a0fa79be7af3e700b8c05d9c
SHA512e9a978b20140a1462c7c97c73a8429da95f5a33877331cbc1c03ef2551dce098b682c90da385618d3401144dc39064687ef4455e5c2c450ce3eac2dbf474234a
-
Filesize
10KB
MD5ad4fd2fbe811bd14ca743bcba25b4048
SHA1acee2ade6bac45781e6b9fff8d4e8c378fa2d957
SHA256f0022613de0c164d65f1deed9ee1ed5ce85bac4481fcefc6308b6c0e805fdedf
SHA512ac9f4e55bd0f7bdac278025e9cdf9545010e2f3c4d5ca4f9957a531d357413a6e96e03e670fcded454e1af29f52fe92ea5c12a82c157ad6e33477a5d644299b9
-
Filesize
85B
MD5ac27618c124688cc795b8d3ac50e0acf
SHA11b9afb567504615e40039d53629ad28fdf159954
SHA256f1a91d5ddf3b198f59abe2d2b0780f0b3f973575b42ac57fe18013d1b6e3f982
SHA512dc179897196dee4b0ff14a1fd568e69ef352bd696a915af20fa70652d511b44eb9d432e0ddc265073dc04943fa0cd39f4a6da9bca980a7191eb541593370ba96
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
5KB
MD5feeae58b39bf37dec871636d0167c6b6
SHA157adcc16a004c7ba431d04c37cb7c97139454571
SHA2564005e00639401b9a4697ecf133a49894cf007914886d5ab90c5e4c3137c9f34a
SHA512f24da11be45205904f43c1cafdcd715e06564b840fc10e3630d5f4d00905439c52b521861355538634c9ffde8e3fc7b7f5fc4a2137167331d133bcd8c3c6c618
-
Filesize
6KB
MD5193ee6384f7d6ff504d759181036b84c
SHA1703bf1a5f9395d5c7dacf5bae661fb70d0367063
SHA2566df46bec887d09b3d59859ea0619f0e9ccb243c68bf724de1b8c5e42f17ce266
SHA5125f7723d04b4d010d20de61b8a119e671d80fbb2a2a2d9ed5f4715e9e256b2ca325a0263574f7921c4c22aaae91a986ac7b70bf9ae5e8032fe88aac0d8c0671f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD531965299ecca38591084df5c1f3374f1
SHA1f928baaccc4a79abe901487f4f7d627135fdcddb
SHA256892dd86f69f7ec54ae077c5cf5e1907675bf01a1c162560af3ecc9b8fcbb800c
SHA5126f96de33c8c32e2071c87273dd56552bad0cdf0460ee78fd46f8270c750bbaf4672c376eee9598506bc442a699d038ba56977c08f9da34b8302ea3eddadba901
-
Filesize
1KB
MD524253b53b63c5d17b977517fefe74d1f
SHA17a9054668b32a7079a27fcae34946165713eda94
SHA2560910403e95574001892eaf1f3d45b56d934727b0b598c90fe132fe53318d979c
SHA51252298c52e345eb27e3085bc39e52f2d5d901b167da554443d393d253f93036cfb1469dec816f3276b19c7ba8df2b6333b2cf46eb0db186c62284435381471741
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684