Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
-
Size
226KB
-
MD5
ed28a3189aefa3589a8602d24d19f1cb
-
SHA1
4619f493d165ffc9893f19a32e197b7572497cd2
-
SHA256
52e15e0deb115003af9f56c7f4e66076a4c859b4e8d782e5ad1d29a95b9164bc
-
SHA512
06577460509c754a2850f69ac250132e73e2367995825632cf358cf7dd20f1774cb38a7c2a214209fe74a10ca8bac7fdf3bc84d0447fe77963a926333d3d73de
-
SSDEEP
6144:BQGB/n4ZWOeRzb2RL6nDHoEpgYH79X+9Ac:l4ZADDHofYGAc
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfhr6.win/9E14-7C32-26AF-0063-76AD
http://cerberhhyed5frqa.cmfhty.win/9E14-7C32-26AF-0063-76AD
http://cerberhhyed5frqa.dk59jg.win/9E14-7C32-26AF-0063-76AD
http://cerberhhyed5frqa.xmfu59.win/9E14-7C32-26AF-0063-76AD
http://cerberhhyed5frqa.er48rt.win/9E14-7C32-26AF-0063-76AD
http://cerberhhyed5frqa.onion/9E14-7C32-26AF-0063-76AD
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" systeminfo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation systeminfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk systeminfo.exe -
Executes dropped EXE 2 IoCs
pid Process 508 systeminfo.exe 2320 systeminfo.exe -
Loads dropped DLL 6 IoCs
pid Process 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 508 systeminfo.exe 508 systeminfo.exe 508 systeminfo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" systeminfo.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp719C.bmp" systeminfo.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2376 set thread context of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 508 set thread context of 2320 508 systeminfo.exe 95 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\pagination systeminfo.exe File opened for modification C:\Windows\ ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Windows\pagination ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Windows\ systeminfo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4948 cmd.exe 3752 PING.EXE 4076 cmd.exe 1576 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cc0-26.dat nsis_installer_1 behavioral2/files/0x0007000000023cc0-26.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 508 systeminfo.exe 2320 systeminfo.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5020 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 5096 taskkill.exe 4908 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\systeminfo.exe\"" systeminfo.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings systeminfo.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3752 PING.EXE 1576 PING.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 2320 systeminfo.exe 1156 msedge.exe 1156 msedge.exe 1148 msedge.exe 1148 msedge.exe 316 msedge.exe 316 msedge.exe 764 identity_helper.exe 764 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Token: SeDebugPrivilege 5096 taskkill.exe Token: SeDebugPrivilege 2320 systeminfo.exe Token: SeBackupPrivilege 2624 vssvc.exe Token: SeRestorePrivilege 2624 vssvc.exe Token: SeAuditPrivilege 2624 vssvc.exe Token: SeIncreaseQuotaPrivilege 3624 wmic.exe Token: SeSecurityPrivilege 3624 wmic.exe Token: SeTakeOwnershipPrivilege 3624 wmic.exe Token: SeLoadDriverPrivilege 3624 wmic.exe Token: SeSystemProfilePrivilege 3624 wmic.exe Token: SeSystemtimePrivilege 3624 wmic.exe Token: SeProfSingleProcessPrivilege 3624 wmic.exe Token: SeIncBasePriorityPrivilege 3624 wmic.exe Token: SeCreatePagefilePrivilege 3624 wmic.exe Token: SeBackupPrivilege 3624 wmic.exe Token: SeRestorePrivilege 3624 wmic.exe Token: SeShutdownPrivilege 3624 wmic.exe Token: SeDebugPrivilege 3624 wmic.exe Token: SeSystemEnvironmentPrivilege 3624 wmic.exe Token: SeRemoteShutdownPrivilege 3624 wmic.exe Token: SeUndockPrivilege 3624 wmic.exe Token: SeManageVolumePrivilege 3624 wmic.exe Token: 33 3624 wmic.exe Token: 34 3624 wmic.exe Token: 35 3624 wmic.exe Token: 36 3624 wmic.exe Token: SeIncreaseQuotaPrivilege 3624 wmic.exe Token: SeSecurityPrivilege 3624 wmic.exe Token: SeTakeOwnershipPrivilege 3624 wmic.exe Token: SeLoadDriverPrivilege 3624 wmic.exe Token: SeSystemProfilePrivilege 3624 wmic.exe Token: SeSystemtimePrivilege 3624 wmic.exe Token: SeProfSingleProcessPrivilege 3624 wmic.exe Token: SeIncBasePriorityPrivilege 3624 wmic.exe Token: SeCreatePagefilePrivilege 3624 wmic.exe Token: SeBackupPrivilege 3624 wmic.exe Token: SeRestorePrivilege 3624 wmic.exe Token: SeShutdownPrivilege 3624 wmic.exe Token: SeDebugPrivilege 3624 wmic.exe Token: SeSystemEnvironmentPrivilege 3624 wmic.exe Token: SeRemoteShutdownPrivilege 3624 wmic.exe Token: SeUndockPrivilege 3624 wmic.exe Token: SeManageVolumePrivilege 3624 wmic.exe Token: 33 3624 wmic.exe Token: 34 3624 wmic.exe Token: 35 3624 wmic.exe Token: 36 3624 wmic.exe Token: 33 3872 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3872 AUDIODG.EXE Token: SeDebugPrivilege 4908 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 2376 wrote to memory of 3604 2376 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 82 PID 3604 wrote to memory of 508 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 88 PID 3604 wrote to memory of 508 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 88 PID 3604 wrote to memory of 508 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 88 PID 3604 wrote to memory of 4948 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 89 PID 3604 wrote to memory of 4948 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 89 PID 3604 wrote to memory of 4948 3604 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 89 PID 4948 wrote to memory of 5096 4948 cmd.exe 91 PID 4948 wrote to memory of 5096 4948 cmd.exe 91 PID 4948 wrote to memory of 5096 4948 cmd.exe 91 PID 4948 wrote to memory of 3752 4948 cmd.exe 92 PID 4948 wrote to memory of 3752 4948 cmd.exe 92 PID 4948 wrote to memory of 3752 4948 cmd.exe 92 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 508 wrote to memory of 2320 508 systeminfo.exe 95 PID 2320 wrote to memory of 5020 2320 systeminfo.exe 96 PID 2320 wrote to memory of 5020 2320 systeminfo.exe 96 PID 2320 wrote to memory of 3624 2320 systeminfo.exe 100 PID 2320 wrote to memory of 3624 2320 systeminfo.exe 100 PID 2320 wrote to memory of 1148 2320 systeminfo.exe 104 PID 2320 wrote to memory of 1148 2320 systeminfo.exe 104 PID 1148 wrote to memory of 1360 1148 msedge.exe 105 PID 1148 wrote to memory of 1360 1148 msedge.exe 105 PID 2320 wrote to memory of 1856 2320 systeminfo.exe 106 PID 2320 wrote to memory of 1856 2320 systeminfo.exe 106 PID 2320 wrote to memory of 2000 2320 systeminfo.exe 107 PID 2320 wrote to memory of 2000 2320 systeminfo.exe 107 PID 2000 wrote to memory of 4792 2000 msedge.exe 109 PID 2000 wrote to memory of 4792 2000 msedge.exe 109 PID 2320 wrote to memory of 2588 2320 systeminfo.exe 110 PID 2320 wrote to memory of 2588 2320 systeminfo.exe 110 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 PID 1148 wrote to memory of 2376 1148 msedge.exe 111 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\systeminfo.exe"C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\systeminfo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Gathers system information
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\systeminfo.exe"C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\systeminfo.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Gathers system information
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:5020
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2ee246f8,0x7ffc2ee24708,0x7ffc2ee247186⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:26⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:86⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:16⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:16⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:16⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:16⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:16⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:86⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:16⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:16⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:16⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7268644388418295415,11406523857788564880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:16⤵PID:1392
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xmfhr6.win/9E14-7C32-26AF-0063-76AD5⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2ee246f8,0x7ffc2ee24708,0x7ffc2ee247186⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14986743176421830221,8614587922406243146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:2588
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "systeminfo.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\systeminfo.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4076 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "systeminfo.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1576
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3752
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x380 0x4141⤵
- Suspicious use of AdjustPrivilegeToken
PID:3872
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5a5dff08e41c7b457bb72347d8856fefe
SHA11e54c6f24429bfd26efdfbbc91715e0953da4ce6
SHA2564ad76f90b775aa04a7f563879dd678f0b7dfe7ce33dc3bbb0b78ad6f70579498
SHA512864b761b1719184a5c0698ff56d1118dd0f6495600d7789f419a6a50c9f1a4bfa753c5b80b0d82de471c36f02796d08f23fcfa07588de2f6e3e94c46c0d93e76
-
Filesize
10KB
MD5f94cb61e218ce3fc34a6582481d5b8f9
SHA1851d8fa6677b986fa336c0626aeb81b79db38438
SHA2563fba65fdae461a6a7dc3be928a91f3c134514bb7031fa8bcfa79f9c8f6f8047d
SHA5125c453cd6ca4edf14109df807db5d91ca2ded5463eac97a4d8b5938b848dc24a9515f292a441f7b838c2f76c26a584c8157dbc522206283d09cafd860d383df55
-
Filesize
85B
MD59641f489984f2e522616eaea45115590
SHA103ea5f3a2e203f509185013098bdabdd3895237c
SHA2564ba6ca4be56e49ddb5101d55d513b1cb2fc87c3315a53109dc00ac89e87d4136
SHA512253a6cc18a17fceab6e6df4c525a0d174af1331c28e7b5fae2564fcef436d351bb115f7e8434aa1d87614136f35319a33f2b69b62106d23a1cc62b5b30540708
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD542cc5e3f4e7f3075f9410fc18d9e8b28
SHA12a2998871bfb1832fff03075592684fb4e3846cc
SHA25695c079ff3691c35d7cb10c468c7421ec7880efeb40c6d9e10455ead79eaa5f83
SHA512f9e92f833e67e39f397eaa86873552f01972bd0ffd1d9cd1c102886f98fa2c9d59d822bc354f8d91e2730365506f0d9e988ecb37eceb78eef922f5d5af9b88e3
-
Filesize
6KB
MD500a87edc1982b58d4f627a751498f1f0
SHA11aad4fb3f88c28d8a8c62720866e2a2187571933
SHA25652ec57d28c96b13ee06f07cbbeae8861478d28bbc7038fd0fd8abc3f277b5f4d
SHA512e25823976beb72a66c829d95656d86e122e329df70bc30b0b6f12bed9bc4a2a5f647237dcc5fd4fe390b5a9b41dff8ccc05a7b5ee77fd48c11095b0851b47a1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd6ce9cbf8b15defc9cc1b3747716140
SHA154b6241a114e596c4a5c3a0ea5d2cd461ab07279
SHA25643214d0ddfc06340264a931e6c2fc418429c501a9b5ee1d8d64f6572f40fd213
SHA5129ad4b22eb51dff4780195ba43ca28987fa06dfd9358edd453a133318f4c35120e227a2357e7a5e1ad9d9bd1aa859810485578305b5209026bef200a2dc08b812
-
Filesize
8KB
MD58fea0a0ed84b5724920e7935291a7401
SHA1f24f2bc12daf0d6f1848d878cfd7a2be0b9c88f1
SHA25622184ed1861916c91f04ba374466c7482ba119def28f4bb21620778bf06a128f
SHA512bab54e242eb20c3e528b85aefc45a481c425e58f9a8dc4a593ea00167635e0f86105ab1ef8b92ca1130012d1a080f69f4da0b3bdf970d47b54eed5e04d1605cb
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
1KB
MD5d0cede259e6e2e380331eeea1e1983f7
SHA150b24fddb05e61c37f4c9bf1fd6db67e5d67f5b6
SHA2565b9701c24fd591d6cdc28a8129c29ff8f5acdb91f5079f7400264861a7a5afa3
SHA512e360d1e802ec80b39eee3cfb104a9f5f1546cfb6681f4cc24acb67ef200ab19e6b97a0a848d742e72114666c0444ac6c2f1524daca4b6f46e1395e50239d2087
-
Filesize
84KB
MD5f47a66f7cf15f17cc98d4cb4f0b34bc2
SHA1e6ae6734c0acf0beab835f168881c6cfa98ac515
SHA25606df7ee9794cc4db9950e0ea805add4870276a794a8756484a6ccd0a96783aa1
SHA51276afe23aae871ef77e8d03248dee2555d64e3eece66561b453f075d871cd7fa477f3715d1663f3de00c1258e53bf87cf5e955d267884874ae196605a80eea81d
-
Filesize
226KB
MD5ed28a3189aefa3589a8602d24d19f1cb
SHA14619f493d165ffc9893f19a32e197b7572497cd2
SHA25652e15e0deb115003af9f56c7f4e66076a4c859b4e8d782e5ad1d29a95b9164bc
SHA51206577460509c754a2850f69ac250132e73e2367995825632cf358cf7dd20f1774cb38a7c2a214209fe74a10ca8bac7fdf3bc84d0447fe77963a926333d3d73de
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853