Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 15:43

General

  • Target

    2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe

  • Size

    651KB

  • MD5

    2249a5da313044cccd423e1b716b0b58

  • SHA1

    0e6d626dd1edf0340e3afd9fcdbb52044d1fb0f3

  • SHA256

    04bd22270af43b1e07cc737c523f493805082f280bc58f4ff3937a516c1fc5cf

  • SHA512

    8824e0c9a4cb40f9f261d5960d43f0bec9294d89b94ab7856068ad3725e6b4c009fdc4338de21f83afe9a28bef702dd001a9c4117fbbbbdf2ae034d1740079bd

  • SSDEEP

    12288:feySOCn73uSYcAEDCNBcXUME8oOoeMhqCk:dSOC7uSnAEDJX3EVu6Fk

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\_READ_THIS_FILE_B5MN_.txt

Ransom Note
CERBER RANSOMWARE --- YOUR D0CUMENTS, PHOTOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! --- The only way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: --- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://hjhqmbxyinislkkt.onion/8DD4-FCC8-6ECD-0093-CA1D Note! This page is available via "Tor Browser" only. --- Also you can use temporary addresses on your personal page without using "Tor Browser". --- 1. http://hjhqmbxyinislkkt.1eagrj.top/8DD4-FCC8-6ECD-0093-CA1D 2. http://hjhqmbxyinislkkt.1a2xx3.top/8DD4-FCC8-6ECD-0093-CA1D 3. http://hjhqmbxyinislkkt.1gu5um.top/8DD4-FCC8-6ECD-0093-CA1D 4. http://hjhqmbxyinislkkt.1w5iy8.top/8DD4-FCC8-6ECD-0093-CA1D 5. http://hjhqmbxyinislkkt.1aajb7.top/8DD4-FCC8-6ECD-0093-CA1D --- Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://hjhqmbxyinislkkt.onion/8DD4-FCC8-6ECD-0093-CA1D

http://hjhqmbxyinislkkt.1eagrj.top/8DD4-FCC8-6ECD-0093-CA1D

http://hjhqmbxyinislkkt.1a2xx3.top/8DD4-FCC8-6ECD-0093-CA1D

http://hjhqmbxyinislkkt.1gu5um.top/8DD4-FCC8-6ECD-0093-CA1D

http://hjhqmbxyinislkkt.1w5iy8.top/8DD4-FCC8-6ECD-0093-CA1D

http://hjhqmbxyinislkkt.1aajb7.top/8DD4-FCC8-6ECD-0093-CA1D

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Blocklisted process makes network request 1 IoCs
  • Contacts a large (1090) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe"
    1⤵
    • Drops startup file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2208
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall reset
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2912
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_KF5JIJN_.hta"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:2176
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_B5MN_.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:2084
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 1 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2356
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1956
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_B5MN_.txt

    Filesize

    1KB

    MD5

    0aa68675d13779c4d2159a0271d90ebf

    SHA1

    67b07f9cdf2e2555f3b7a8f10bf40c16508ba04d

    SHA256

    c0a30d61c44f1fe4b6ff9cf0d30671a558d1a91ad81154b15d0a06ea41821468

    SHA512

    dd11a2e77fd31bb542601c1c1c286a1fcd57f55c55fa04d3c9b6e808f9f79b58d3c9d0a3ad917aed9d682b1fb91e5a75dbbe7f5170cb3f6106d57ce8c2b1ee78

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_KF5JIJN_.hta

    Filesize

    74KB

    MD5

    48b14aed7aaba4847b5142b56355ad27

    SHA1

    449c608ef4725bffb16d29fe2bce9a9bcb5cb480

    SHA256

    2490bdb8c630fffdd5fff192ded3abfb15c1f9daa1ba0c6f476253c91d03a332

    SHA512

    a077c46493f8666e6212d8e5adaf225f7c96bce41984332f762c5c496c8b61623db78171a2f654f131ce0caf117b40282bd458b8ae4bff704603508c3e99c3ac

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_UK36_.jpeg

    Filesize

    150KB

    MD5

    c1be637266694e03cb4997f40ba57935

    SHA1

    8bf7c0e052190fe67c72a3fe085ed83277a09332

    SHA256

    29e0a59c5aacbd858d11e65c1a1e35fb0846f934d34c41ad4bd5cf343c093292

    SHA512

    57a443a2d6c6e7a302985c014d37f68450fa0603e0c35f38ef1e7acd383b5396e4fb2c13184191f81470da4fac2404169cb621676f8d1605b4b3008ee3249dc8

  • memory/1956-144-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/3012-1-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3012-0-0x0000000000120000-0x0000000000157000-memory.dmp

    Filesize

    220KB

  • memory/3012-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3012-6-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3012-118-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3012-143-0x00000000048A0000-0x00000000048A2000-memory.dmp

    Filesize

    8KB

  • memory/3012-167-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB