Analysis

  • max time kernel
    12s
  • max time network
    6s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    19-12-2024 22:47

General

  • Target

    Perm Loader.vmp.exe

  • Size

    5.7MB

  • MD5

    50c87f75cb5583c0456b582ec37fba1e

  • SHA1

    3c8625a583a3e7fd1f668150a5072b477182a4f1

  • SHA256

    c83954ab01cc2d5ad6a91325fda5c3758769044143275690685d53b87c7bb588

  • SHA512

    28211a4a90a335ca016f2b74e9f18dc4ca49f6c3c205f5ee4d7ef229220f576083284b8cd47888ccd20b24e378ecbdecd7eeffb2e172363e5aa9f6bfd1c99841

  • SSDEEP

    98304:NP5gmktJUfGLCwRcIoMPPqpnNUjhfKwXV1b27OMvTUDsiBribTsOyCT+eiFZ:Nxgm4qf18PqpN4Kwq79TUDsii0OpiFZ

Malware Config

Signatures

  • Cerber 47 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Executes dropped EXE 22 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 2 IoCs
  • Kills process with taskkill 59 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Perm Loader.vmp.exe
    "C:\Users\Admin\AppData\Local\Temp\Perm Loader.vmp.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:444
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im KsDumperClient.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3132
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im KsDumper.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerUI.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3428
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:3900
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerSvc.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3344
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im ProcessHacker.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im idaq.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2836
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im idaq64.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3784
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Wireshark.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2316
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Fiddler.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2052
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3248
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im FiddlerEverywhere.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2020
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos64.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2828
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos32.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2240
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im de4dot.exe
          3⤵
          • Cerber
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2584
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:1512
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1860
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im Cheat Engine.exe
            3⤵
            • Cerber
            • Kills process with taskkill
            PID:1708
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
          2⤵
            PID:3400
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im cheatengine-x86_64.exe
              3⤵
              • Cerber
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2216
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&1
            2⤵
              PID:1908
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe
                3⤵
                • Cerber
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4744
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&1
              2⤵
                PID:3692
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe
                  3⤵
                  • Cerber
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4140
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&1
                2⤵
                  PID:4348
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im MugenJinFuu-i386.exe
                    3⤵
                    • Cerber
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3716
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
                  2⤵
                    PID:4116
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im cheatengine-x86_64.exe
                      3⤵
                      • Cerber
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:436
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&1
                    2⤵
                      PID:2660
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im cheatengine-i386.exe
                        3⤵
                        • Cerber
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4416
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&1
                      2⤵
                        PID:2292
                        • C:\Windows\system32\taskkill.exe
                          taskkill /f /im HTTP Debugger Windows Service (32 bit).exe
                          3⤵
                          • Cerber
                          • Kills process with taskkill
                          PID:380
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
                        2⤵
                          PID:4640
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im KsDumper.exe
                            3⤵
                            • Cerber
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:816
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /IVN "AMI"
                          2⤵
                            PID:1644
                            • C:\Windows\System32\AMIDEWINx64.EXE
                              C:\Windows\System32\AMIDEWINx64.EXE /IVN "AMI"
                              3⤵
                              • Cerber
                              • Executes dropped EXE
                              PID:3040
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&1
                            2⤵
                              PID:3396
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im OllyDbg.exe
                                3⤵
                                • Cerber
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2496
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"
                              2⤵
                                PID:872
                                • C:\Windows\System32\AMIDEWINx64.EXE
                                  C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"
                                  3⤵
                                  • Cerber
                                  • Executes dropped EXE
                                  PID:3412
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c taskkill /f /im x64dbg.exe >nul 2>&1
                                2⤵
                                  PID:3816
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /f /im x64dbg.exe
                                    3⤵
                                    • Cerber
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4320
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"
                                  2⤵
                                    PID:2004
                                    • C:\Windows\System32\AMIDEWINx64.EXE
                                      C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"
                                      3⤵
                                      • Cerber
                                      • Executes dropped EXE
                                      PID:1952
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c taskkill /f /im x32dbg.exe >nul 2>&1
                                    2⤵
                                      PID:3056
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /f /im x32dbg.exe
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2000
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SV "System version"
                                      2⤵
                                        PID:1244
                                        • C:\Windows\System32\AMIDEWINx64.EXE
                                          C:\Windows\System32\AMIDEWINx64.EXE /SV "System version"
                                          3⤵
                                          • Cerber
                                          • Executes dropped EXE
                                          PID:3260
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        2⤵
                                          PID:4648
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1556
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SS MZ40GCAI0R
                                          2⤵
                                            PID:2332
                                            • C:\Windows\System32\AMIDEWINx64.EXE
                                              C:\Windows\System32\AMIDEWINx64.EXE /SS MZ40GCAI0R
                                              3⤵
                                              • Cerber
                                              • Executes dropped EXE
                                              PID:4556
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                            2⤵
                                              PID:4624
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im HTTPDebuggerUI.exe
                                                3⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2488
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SU AUTO
                                              2⤵
                                                PID:1192
                                                • C:\Windows\System32\AMIDEWINx64.EXE
                                                  C:\Windows\System32\AMIDEWINx64.EXE /SU AUTO
                                                  3⤵
                                                  • Cerber
                                                  • Executes dropped EXE
                                                  PID:1108
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                2⤵
                                                  PID:1812
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /f /im HTTPDebuggerSvc.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2920
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"
                                                  2⤵
                                                    PID:4452
                                                    • C:\Windows\System32\AMIDEWINx64.EXE
                                                      C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"
                                                      3⤵
                                                      • Cerber
                                                      • Executes dropped EXE
                                                      PID:3152
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"
                                                    2⤵
                                                      PID:4928
                                                      • C:\Windows\System32\AMIDEWINx64.EXE
                                                        C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"
                                                        3⤵
                                                        • Cerber
                                                        • Executes dropped EXE
                                                        PID:4336
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&1
                                                      2⤵
                                                        PID:1072
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /f /im Ida64.exe
                                                          3⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1084
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BM "ASRock"
                                                        2⤵
                                                          PID:4328
                                                          • C:\Windows\System32\AMIDEWINx64.EXE
                                                            C:\Windows\System32\AMIDEWINx64.EXE /BM "ASRock"
                                                            3⤵
                                                            • Cerber
                                                            • Executes dropped EXE
                                                            PID:1684
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&1
                                                          2⤵
                                                            PID:4904
                                                            • C:\Windows\system32\taskkill.exe
                                                              taskkill /f /im OllyDbg.exe
                                                              3⤵
                                                              • Kills process with taskkill
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3900
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BP "B560M-C"
                                                            2⤵
                                                              PID:2872
                                                              • C:\Windows\System32\AMIDEWINx64.EXE
                                                                C:\Windows\System32\AMIDEWINx64.EXE /BP "B560M-C"
                                                                3⤵
                                                                • Cerber
                                                                • Executes dropped EXE
                                                                PID:3012
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&1
                                                              2⤵
                                                                PID:2628
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill /f /im Dbg64.exe
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1920
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BV " "
                                                                2⤵
                                                                  PID:2668
                                                                  • C:\Windows\System32\AMIDEWINx64.EXE
                                                                    C:\Windows\System32\AMIDEWINx64.EXE /BV " "
                                                                    3⤵
                                                                    • Cerber
                                                                    • Executes dropped EXE
                                                                    PID:1600
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&1
                                                                  2⤵
                                                                    PID:888
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /f /im Dbg32.exe
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4636
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BS PBC8ZFQ7FZ8W9S
                                                                    2⤵
                                                                      PID:3608
                                                                      • C:\Windows\System32\AMIDEWINx64.EXE
                                                                        C:\Windows\System32\AMIDEWINx64.EXE /BS PBC8ZFQ7FZ8W9S
                                                                        3⤵
                                                                        • Cerber
                                                                        • Executes dropped EXE
                                                                        PID:4984
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im Taskmgr.exe >nul 2>&1
                                                                      2⤵
                                                                        PID:4676
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /f /im Taskmgr.exe
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2632
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BT "Default string"
                                                                        2⤵
                                                                          PID:4056
                                                                          • C:\Windows\System32\AMIDEWINx64.EXE
                                                                            C:\Windows\System32\AMIDEWINx64.EXE /BT "Default string"
                                                                            3⤵
                                                                            • Cerber
                                                                            • Executes dropped EXE
                                                                            PID:4428
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                          2⤵
                                                                            PID:4800
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4536
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BLC "Default string"
                                                                            2⤵
                                                                              PID:820
                                                                              • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                C:\Windows\System32\AMIDEWINx64.EXE /BLC "Default string"
                                                                                3⤵
                                                                                • Cerber
                                                                                • Executes dropped EXE
                                                                                PID:3656
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CM "Default string"
                                                                              2⤵
                                                                                PID:3460
                                                                                • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                  C:\Windows\System32\AMIDEWINx64.EXE /CM "Default string"
                                                                                  3⤵
                                                                                  • Cerber
                                                                                  • Executes dropped EXE
                                                                                  PID:1512
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                2⤵
                                                                                  PID:1416
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1576
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CV "Default string"
                                                                                  2⤵
                                                                                    PID:3640
                                                                                    • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                      C:\Windows\System32\AMIDEWINx64.EXE /CV "Default string"
                                                                                      3⤵
                                                                                      • Cerber
                                                                                      • Executes dropped EXE
                                                                                      PID:2544
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CS SWCF9IZW37
                                                                                    2⤵
                                                                                      PID:3400
                                                                                      • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                        C:\Windows\System32\AMIDEWINx64.EXE /CS SWCF9IZW37
                                                                                        3⤵
                                                                                        • Cerber
                                                                                        • Executes dropped EXE
                                                                                        PID:3516
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                      2⤵
                                                                                        PID:1516
                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                          taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                          3⤵
                                                                                          • Kills process with taskkill
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1124
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&1
                                                                                        2⤵
                                                                                          PID:4660
                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                            taskkill /f /im KsDumperClient.exe
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4960
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CA "Default string"
                                                                                          2⤵
                                                                                            PID:1128
                                                                                            • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                              C:\Windows\System32\AMIDEWINx64.EXE /CA "Default string"
                                                                                              3⤵
                                                                                              • Cerber
                                                                                              • Executes dropped EXE
                                                                                              PID:860
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CSK "SKU"
                                                                                            2⤵
                                                                                              PID:436
                                                                                              • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                                C:\Windows\System32\AMIDEWINx64.EXE /CSK "SKU"
                                                                                                3⤵
                                                                                                • Cerber
                                                                                                • Executes dropped EXE
                                                                                                PID:1924
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
                                                                                              2⤵
                                                                                                PID:4260
                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                  taskkill /f /im KsDumper.exe
                                                                                                  3⤵
                                                                                                  • Kills process with taskkill
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3364
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PSN "To Be Filled By O.E.M."
                                                                                                2⤵
                                                                                                  PID:4724
                                                                                                  • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                                    C:\Windows\System32\AMIDEWINx64.EXE /PSN "To Be Filled By O.E.M."
                                                                                                    3⤵
                                                                                                    • Cerber
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1856
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PAT "To Be Filled By O.E.M."
                                                                                                  2⤵
                                                                                                    PID:2416
                                                                                                    • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                                      C:\Windows\System32\AMIDEWINx64.EXE /PAT "To Be Filled By O.E.M."
                                                                                                      3⤵
                                                                                                      • Cerber
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2500
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                                                                    2⤵
                                                                                                      PID:5052
                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                        taskkill /f /im HTTPDebuggerUI.exe
                                                                                                        3⤵
                                                                                                        • Kills process with taskkill
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1864
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PPN "To Be Filled By O.E.M."
                                                                                                      2⤵
                                                                                                        PID:1644
                                                                                                        • C:\Windows\System32\AMIDEWINx64.EXE
                                                                                                          C:\Windows\System32\AMIDEWINx64.EXE /PPN "To Be Filled By O.E.M."
                                                                                                          3⤵
                                                                                                          • Cerber
                                                                                                          • Executes dropped EXE
                                                                                                          PID:4244
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                                                                        2⤵
                                                                                                          PID:3396
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            taskkill /f /im HTTPDebuggerSvc.exe
                                                                                                            3⤵
                                                                                                            • Kills process with taskkill
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:3412
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c cls
                                                                                                          2⤵
                                                                                                            PID:3060
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&1
                                                                                                            2⤵
                                                                                                              PID:648
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                taskkill /f /im ProcessHacker.exe
                                                                                                                3⤵
                                                                                                                • Kills process with taskkill
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4384
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&1
                                                                                                              2⤵
                                                                                                                PID:4868
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  taskkill /f /im idaq.exe
                                                                                                                  3⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1344
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&1
                                                                                                                2⤵
                                                                                                                  PID:3820
                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                    taskkill /f /im idaq64.exe
                                                                                                                    3⤵
                                                                                                                    • Kills process with taskkill
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4132
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&1
                                                                                                                  2⤵
                                                                                                                    PID:1244
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /f /im Wireshark.exe
                                                                                                                      3⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:1148
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&1
                                                                                                                    2⤵
                                                                                                                      PID:4532
                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                        taskkill /f /im Fiddler.exe
                                                                                                                        3⤵
                                                                                                                        • Kills process with taskkill
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:5060
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&1
                                                                                                                      2⤵
                                                                                                                        PID:4624
                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                          taskkill /f /im FiddlerEverywhere.exe
                                                                                                                          3⤵
                                                                                                                          • Kills process with taskkill
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:3192
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&1
                                                                                                                        2⤵
                                                                                                                          PID:3884
                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                            taskkill /f /im Xenos64.exe
                                                                                                                            3⤵
                                                                                                                            • Kills process with taskkill
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:2852
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&1
                                                                                                                          2⤵
                                                                                                                            PID:2920
                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                              taskkill /f /im Xenos.exe
                                                                                                                              3⤵
                                                                                                                              • Kills process with taskkill
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:1812
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&1
                                                                                                                            2⤵
                                                                                                                              PID:3920
                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                taskkill /f /im Xenos32.exe
                                                                                                                                3⤵
                                                                                                                                • Kills process with taskkill
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:3660
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&1
                                                                                                                              2⤵
                                                                                                                                PID:3768
                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                  taskkill /f /im de4dot.exe
                                                                                                                                  3⤵
                                                                                                                                  • Kills process with taskkill
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:3344
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&1
                                                                                                                                2⤵
                                                                                                                                  PID:516
                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                    taskkill /f /im Cheat Engine.exe
                                                                                                                                    3⤵
                                                                                                                                    • Kills process with taskkill
                                                                                                                                    PID:3900
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
                                                                                                                                  2⤵
                                                                                                                                    PID:4328
                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                      taskkill /f /im cheatengine-x86_64.exe
                                                                                                                                      3⤵
                                                                                                                                      • Kills process with taskkill
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:4904
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&1
                                                                                                                                    2⤵
                                                                                                                                      PID:3000
                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                        taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe
                                                                                                                                        3⤵
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:4788
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&1
                                                                                                                                      2⤵
                                                                                                                                        PID:2628
                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                          taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe
                                                                                                                                          3⤵
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2956
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&1
                                                                                                                                        2⤵
                                                                                                                                          PID:3144
                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                            taskkill /f /im MugenJinFuu-i386.exe
                                                                                                                                            3⤵
                                                                                                                                            • Kills process with taskkill
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:1776
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
                                                                                                                                          2⤵
                                                                                                                                            PID:4304
                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                              taskkill /f /im cheatengine-x86_64.exe
                                                                                                                                              3⤵
                                                                                                                                              • Kills process with taskkill
                                                                                                                                              PID:888
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&1
                                                                                                                                            2⤵
                                                                                                                                              PID:4100
                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                taskkill /f /im cheatengine-i386.exe
                                                                                                                                                3⤵
                                                                                                                                                • Kills process with taskkill
                                                                                                                                                PID:3680
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c shutdown /r /t 0
                                                                                                                                              2⤵
                                                                                                                                                PID:2876
                                                                                                                                                • C:\Windows\system32\shutdown.exe
                                                                                                                                                  shutdown /r /t 0
                                                                                                                                                  3⤵
                                                                                                                                                    PID:2476
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3248
                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                      taskkill /f /im HTTP Debugger Windows Service (32 bit).exe
                                                                                                                                                      3⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      PID:1368
                                                                                                                                                • C:\Windows\system32\LogonUI.exe
                                                                                                                                                  "LogonUI.exe" /flags:0x4 /state0:0xa39da055 /state1:0x41c64e6d
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2752

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Matrix

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Windows\System32\AMIDEWINx64.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    455KB

                                                                                                                                                    MD5

                                                                                                                                                    9adfcdac59db3286690c7eede8da2528

                                                                                                                                                    SHA1

                                                                                                                                                    0b54d251438a634bd13b49a1f20587cf03d4598d

                                                                                                                                                    SHA256

                                                                                                                                                    13037eedd91f9313ec0d807947db65c639642e5ae6497e87d12fa6d19951f78e

                                                                                                                                                    SHA512

                                                                                                                                                    fde1700cdb4212593ec2733944a169c7d02f436ca6831719a33482fbfd0be289697c9aa6ce7ddfb6c245e87952b35416929bbf69753d21a24197ac6c2d1243cc

                                                                                                                                                  • C:\Windows\System32\amifldrv64.sys

                                                                                                                                                    Filesize

                                                                                                                                                    29KB

                                                                                                                                                    MD5

                                                                                                                                                    f22740ba54a400fd2be7690bb204aa08

                                                                                                                                                    SHA1

                                                                                                                                                    5812387783d61c6ab5702213bb968590a18065e3

                                                                                                                                                    SHA256

                                                                                                                                                    65c26276cadda7a36f8977d1d01120edb5c3418be2317d501761092d5f9916c9

                                                                                                                                                    SHA512

                                                                                                                                                    ac1f89736cf348f634b526569b5783118a1a35324f9ce2f2804001e5a04751f8cc21d09bfa1c4803cd14a64152beba868f5ecf119f10fa3ccbe680d2fb481500

                                                                                                                                                  • memory/3760-0-0x00007FF66730B000-0x00007FF667667000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    3.4MB

                                                                                                                                                  • memory/3760-2-0x00007FF667160000-0x00007FF667C10000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.7MB

                                                                                                                                                  • memory/3760-1-0x00007FFD9D850000-0x00007FFD9D852000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8KB

                                                                                                                                                  • memory/3760-5-0x00007FF667160000-0x00007FF667C10000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.7MB

                                                                                                                                                  • memory/3760-32-0x00007FF66730B000-0x00007FF667667000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    3.4MB

                                                                                                                                                  • memory/3760-34-0x00007FF667160000-0x00007FF667C10000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.7MB