Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe
-
Size
191KB
-
MD5
eeb577cb2bfb9045e982a45ce2b192c1
-
SHA1
a0a85edc16546ca8bbd8ccd9f569baff6f84e5be
-
SHA256
10daa7489b6a122e3a2eee2844eb7f7211b2c84b57c6c4b5607722ace54a39ed
-
SHA512
09ff7c1dc1d8c332c87d43317ba32f49ea46982d373e8cca833bfaf3fd4fc7c017c8c6171919d0a135314ef32ec27618a9c71f3e4b498ab37439ba428ebdd5f7
-
SSDEEP
3072:lvMMrUKvz70K3Xpcwgu1dV0jFtOaptWv6AO1YyTNziTAQ625sGe:lvfP4Icfu1faFt3tW+YUUjSF
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/AE2D-6931-8355-0063-7730
http://cerberhhyed5frqa.45tori.win/AE2D-6931-8355-0063-7730
http://cerberhhyed5frqa.fkr84i.win/AE2D-6931-8355-0063-7730
http://cerberhhyed5frqa.fkri48.win/AE2D-6931-8355-0063-7730
http://cerberhhyed5frqa.djre89.win/AE2D-6931-8355-0063-7730
http://cerberhhyed5frqa.onion/AE2D-6931-8355-0063-7730
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" grpconv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation grpconv.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\grpconv.lnk eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\grpconv.lnk grpconv.exe -
Executes dropped EXE 1 IoCs
pid Process 212 grpconv.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\grpconv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\grpconv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\grpconv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" grpconv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\grpconv = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" grpconv.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE039.bmp" grpconv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1000 cmd.exe 2584 PING.EXE 1172 cmd.exe 528 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 992 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 528 taskkill.exe 4556 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop grpconv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\grpconv.exe\"" grpconv.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings grpconv.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2584 PING.EXE 528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 212 grpconv.exe 4756 msedge.exe 4756 msedge.exe 4068 msedge.exe 4068 msedge.exe 3576 msedge.exe 3576 msedge.exe 3172 identity_helper.exe 3172 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe Token: SeDebugPrivilege 212 grpconv.exe Token: SeDebugPrivilege 528 taskkill.exe Token: SeBackupPrivilege 1396 vssvc.exe Token: SeRestorePrivilege 1396 vssvc.exe Token: SeAuditPrivilege 1396 vssvc.exe Token: SeIncreaseQuotaPrivilege 4008 wmic.exe Token: SeSecurityPrivilege 4008 wmic.exe Token: SeTakeOwnershipPrivilege 4008 wmic.exe Token: SeLoadDriverPrivilege 4008 wmic.exe Token: SeSystemProfilePrivilege 4008 wmic.exe Token: SeSystemtimePrivilege 4008 wmic.exe Token: SeProfSingleProcessPrivilege 4008 wmic.exe Token: SeIncBasePriorityPrivilege 4008 wmic.exe Token: SeCreatePagefilePrivilege 4008 wmic.exe Token: SeBackupPrivilege 4008 wmic.exe Token: SeRestorePrivilege 4008 wmic.exe Token: SeShutdownPrivilege 4008 wmic.exe Token: SeDebugPrivilege 4008 wmic.exe Token: SeSystemEnvironmentPrivilege 4008 wmic.exe Token: SeRemoteShutdownPrivilege 4008 wmic.exe Token: SeUndockPrivilege 4008 wmic.exe Token: SeManageVolumePrivilege 4008 wmic.exe Token: 33 4008 wmic.exe Token: 34 4008 wmic.exe Token: 35 4008 wmic.exe Token: 36 4008 wmic.exe Token: SeIncreaseQuotaPrivilege 4008 wmic.exe Token: SeSecurityPrivilege 4008 wmic.exe Token: SeTakeOwnershipPrivilege 4008 wmic.exe Token: SeLoadDriverPrivilege 4008 wmic.exe Token: SeSystemProfilePrivilege 4008 wmic.exe Token: SeSystemtimePrivilege 4008 wmic.exe Token: SeProfSingleProcessPrivilege 4008 wmic.exe Token: SeIncBasePriorityPrivilege 4008 wmic.exe Token: SeCreatePagefilePrivilege 4008 wmic.exe Token: SeBackupPrivilege 4008 wmic.exe Token: SeRestorePrivilege 4008 wmic.exe Token: SeShutdownPrivilege 4008 wmic.exe Token: SeDebugPrivilege 4008 wmic.exe Token: SeSystemEnvironmentPrivilege 4008 wmic.exe Token: SeRemoteShutdownPrivilege 4008 wmic.exe Token: SeUndockPrivilege 4008 wmic.exe Token: SeManageVolumePrivilege 4008 wmic.exe Token: 33 4008 wmic.exe Token: 34 4008 wmic.exe Token: 35 4008 wmic.exe Token: 36 4008 wmic.exe Token: 33 2076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2076 AUDIODG.EXE Token: SeDebugPrivilege 4556 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 212 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 83 PID 4152 wrote to memory of 212 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 83 PID 4152 wrote to memory of 212 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 83 PID 4152 wrote to memory of 1000 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 84 PID 4152 wrote to memory of 1000 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 84 PID 4152 wrote to memory of 1000 4152 eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe 84 PID 1000 wrote to memory of 528 1000 cmd.exe 86 PID 1000 wrote to memory of 528 1000 cmd.exe 86 PID 1000 wrote to memory of 528 1000 cmd.exe 86 PID 212 wrote to memory of 992 212 grpconv.exe 87 PID 212 wrote to memory of 992 212 grpconv.exe 87 PID 1000 wrote to memory of 2584 1000 cmd.exe 91 PID 1000 wrote to memory of 2584 1000 cmd.exe 91 PID 1000 wrote to memory of 2584 1000 cmd.exe 91 PID 212 wrote to memory of 4008 212 grpconv.exe 93 PID 212 wrote to memory of 4008 212 grpconv.exe 93 PID 212 wrote to memory of 4068 212 grpconv.exe 112 PID 212 wrote to memory of 4068 212 grpconv.exe 112 PID 4068 wrote to memory of 1032 4068 msedge.exe 113 PID 4068 wrote to memory of 1032 4068 msedge.exe 113 PID 212 wrote to memory of 4740 212 grpconv.exe 114 PID 212 wrote to memory of 4740 212 grpconv.exe 114 PID 212 wrote to memory of 1728 212 grpconv.exe 116 PID 212 wrote to memory of 1728 212 grpconv.exe 116 PID 1728 wrote to memory of 1952 1728 msedge.exe 117 PID 1728 wrote to memory of 1952 1728 msedge.exe 117 PID 212 wrote to memory of 3152 212 grpconv.exe 118 PID 212 wrote to memory of 3152 212 grpconv.exe 118 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 PID 4068 wrote to memory of 3556 4068 msedge.exe 119 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\grpconv.exe"C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\grpconv.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:992
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a2346f8,0x7fff5a234708,0x7fff5a2347184⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:24⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:84⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:14⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:14⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:14⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:14⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:84⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:14⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:14⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:14⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:14⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18187208237413313931,4888370295449085034,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2256 /prefetch:14⤵PID:4152
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.vmfu48.win/AE2D-6931-8355-0063-77303⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a2346f8,0x7fff5a234708,0x7fff5a2347184⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,408608626409511429,5864139349898458308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3152
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "grpconv.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\grpconv.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1172 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "grpconv.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:528
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "eeb577cb2bfb9045e982a45ce2b192c1_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2584
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c8 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5724b966d24b311301fb14b7c30bb8df6
SHA1c171b05139abb1b1b2d9e6d71e243fb8d2d8a3a9
SHA2562f52f14a392a07828616b6ee06d8c6687a5f9e5abb6e74b17cad8d87822948ad
SHA5127ba0896497cc5653382e54c3e5dbf26fb920df1b959f9a68d020a822325b3fabcc9f538e4f62fdbf17396262be3b7e2f2bcd3a2a07a1fdd7d20e73bba490c9a3
-
Filesize
10KB
MD5608340a39392d2d4851a373c5f2c9333
SHA1991c096ba3e2adda89a024badb2f7842dc43bfb2
SHA2562d4d140d761e3c1be425ec1d10b08ede498cf07f2cf9b19e51fb8d3901a05227
SHA512b1adacbfc506978ab762873cd57c8ff593677c7f5adb7b2a5cda26858aebb6208b35324595a496f1ca5cb0775ec4fba6642722db634033e564b463c715f2c3f4
-
Filesize
85B
MD58f799b26b993c761ce7974d94fe69891
SHA13fe380fb34c6c83bf3fee3a6510697d4a0e22dea
SHA25682ca0f4e67ef6cc848f378ea49bf971984e5fa188423a0303390536a65eecbfd
SHA512fc031d91a8b1ca300f0f1118cd09dc9ce6c21c743166cd724cf9e9602b5405687c4528cf22799422346d128a65659151bc3886a07b1b97aa9737b73807f102eb
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
5KB
MD5cb0cbf252e00ca06ac737b2a8972b27d
SHA19de8ee05993e90f3d0f5a46840ef9a2c3aff4c86
SHA256d8a6791e998cf4efb7130102cdd781f0972c68700da4a0049c1c13e4bb4a7a90
SHA512db87449ecd7c3a66e5a3022b6bad25b171252b59ef44626e04911f93be703f4828cbb6dc2e3bd520859831fc1193d23411d5cec084bccf411aacd10d5b9db7c9
-
Filesize
6KB
MD5be5dd294175c5949454784b56396d621
SHA1b5477a461f2c7791a06cbfcbf14f3d03a7da0f22
SHA2561bd3d8ccc0fe60f35d4acdfaa47ba1a50e6f065eef7ebcebfced31677724a8d8
SHA512b41a18e47ad162a1db2ee8de1d3a2312abe0554308f1fe89787513e8919cdbd9dc5d7b1e9322db20a941acb6f4236058b7d979da10455b3ebb930504b00b01b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52b25a427521760cb0d54d0cde33396ba
SHA159584cbca7b0430aaef01ad9c74acfe39688a42d
SHA25652669773bf439883c07e183f1a24fee9335a8fe1936eee1c415e8cb6a17bba49
SHA51250ae830861309db6e05c6fe0e42fc2bb2270ff29712f6f4b1d880819fea5412e41f138c3eae373c3d353f88174fccdaa99996d6ed8d8a3502436ea73109e35f9
-
Filesize
8KB
MD52cae6ea5b047d2c72d163b28b29ee0f5
SHA103995ac78a8e033397aa09a79cbc39c20aab7a61
SHA256acce6229dcf98851ff6fea0bd736638ccb9fe1c0a0ff51dc45e7f4352a81c2f1
SHA512eb0c3603bd8d3bb1618d47d909fb8bd20c71f082d3327e6422f8c34ee694cd30463ad076598694ac485ba745ce625e3d4af3112759982e352fd08bd9aae92dd2
-
Filesize
1KB
MD5cd0b4ff20b4b4eb0527e2ab627b61298
SHA1db8642032576dc2286e925169aaf64fdc6670652
SHA2565b7dd99f2742547ea4932cb1a5c52df39df26f5f803c65deb73c69811fa99adb
SHA5127480593b99ab8f8c89701f8a28a9de9de882431d2379261852e5961f6410fb6ce5f804ad883f55b384b1a15c461ff4ee2ea288f120cce3f76bd36784d9ded1a1
-
Filesize
191KB
MD5eeb577cb2bfb9045e982a45ce2b192c1
SHA1a0a85edc16546ca8bbd8ccd9f569baff6f84e5be
SHA25610daa7489b6a122e3a2eee2844eb7f7211b2c84b57c6c4b5607722ace54a39ed
SHA51209ff7c1dc1d8c332c87d43317ba32f49ea46982d373e8cca833bfaf3fd4fc7c017c8c6171919d0a135314ef32ec27618a9c71f3e4b498ab37439ba428ebdd5f7
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853