Analysis

  • max time kernel
    57s
  • max time network
    59s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 19:15

General

  • Target

    09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe

  • Size

    276KB

  • MD5

    685d1b61e34fdff8ebd5e1ad7d7a62ae

  • SHA1

    e8dc6e16901372dd70f9472a5965e6ec3c39e7e5

  • SHA256

    09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770

  • SHA512

    754e3a3e74f83733e08aa0830e154b790a5f9c71b7e952013078142c73702c680beb561190b4778ce33ae9192a82b7bff916c31bb83b80cc46d00ee83f09be99

  • SSDEEP

    6144:T28A9pceLeNFNYe3ipeVcq1ycyIvNLF/pDQOted5fJMiwT5g:y8GZLeN/d3tcZmP/pkAw5m5g

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_EET64NM_.txt

Ransom Note
CERBER RANSOMWARE --- YOUR DOCUMENTS, PHOTOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! --- The only way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: --- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019 Note! This page is available via "Tor Browser" only. --- Also you can use temporary addresses on your personal page without using "Tor Browser". --- 1. http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019 2. http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019 3. http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019 4. http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019 5. http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019 --- Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019

http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019

http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019

http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019

http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019

http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_YJ1HSXEO_.hta

Family

cerber

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;: Instructions</title> <HTA:APPLICATION APPLICATIONNAME="Instructions" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; padding-left: 35px; background: url('data:image/gif;base64,R0lGODlhGQAZAKIEAMzMzJmZmTMzM2ZmZgAAAAAAAAAAAAAAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQFAAAEACwAAAAAGQAZAAADVki63P4wSEiZvLXemRf4yhYoQ0l9aMiVLISCDms+L/DIwwnfc+c3qZ9g6Hn5hkhF7YgUKI2dpvNpExJ/WKquSoMCvd9geDeuBpcuGFrcQWep5Df7jU0AACH5BAUAAAQALAoAAQAOABQAAAMwSLDU/iu+Gdl0FbTAqeXg5YCdSJCBuZVqKw5wC8/qHJv2IN+uKvytn9AnFBCHx0cCACH5BAUAAAQALAoABAAOABQAAAMzSLoEzrC5F9Wk9YK6Jv8gEYzgaH4myaVBqYbfIINyHdcDI+wKniu7YG+2CPI4RgFI+EkAACH5BAUAAAQALAQACgAUAA4AAAMzSLrcBNDJBeuUNd6WwXbWtwnkFZwMqUpnu6il06IKLChDrsxBGufAHW0C1IlwxeMieEkAACH5BAUAAAQALAEACgAUAA4AAAM0SLLU/lAtFquctk6aIe5gGA1kBpwPqVZn66hl1KINPDRB3sxAGufAHc0C1IkIxcARZ4QkAAAh+QQFAAAEACwBAAQADgAUAAADMUhK0vurSfiko8oKHC//yyCCYvmVI4cOZAq+UCCDcv3VM4cHCuDHOZ/wI/xxigDQMAEAIfkEBQAABAAsAQABAA4AFAAAAzNIuizOkLgZ13xraHVF1puEKWBYlUP1pWrLBLALz+0cq3Yg324PAUAXcNgaBlVGgPAISQAAIfkEBQAABAAsAQABABQADgAAAzRIujzOMBJHpaXPksAVHoogMlzpZWK6lF2UjgobSK9AtjSs7QTg8xCfELgQ/og9I1IxXCYAADs=') left no-repeat; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a id="change_language" href="#" onclick="return changeLanguage1();" title="English">&#9745; English</a> <h1>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return showBlock('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return showBlock('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return showBlock('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return showBlock('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return showBlock('fr');">Français</a></li> <li><a href="#" title="German" onclick="return showBlock('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return showBlock('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return showBlock('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return showBlock('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return showBlock('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return showBlock('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return showBlock('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return showBlock('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't you find the necessary files?<br>Is the content of your files not readable?</p> <p>It is normal because the files' names and the data in your files have been encrypted by "Cer&#98;er&nbsp;Rans&#111;mware".</p> <p>It means your files are NOT damaged! Your files are modified only. This modification is reversible.<br>From now it is not possible to use your files until they will be decrypted.</p> <p>The only way to decrypt your files safely is to &#98;uy the special decryption software "Cer&#98;er&nbsp;Decryptor".</p> <p>Any attempts to restore your files with the third-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proceed with purchasing of the decryption software at your personal page:</p> <p><span class="info"><span class="updating">Please wait...</span><a class="url" href="http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019</a></span></p> <p>If this page cannot be opened &nbsp;<span class="button" onclick="return updUrl('en');">click here</span>&nbsp; to get a new address of your personal page.<br><br>If the address of your personal page is the same as before after you tried to get a new one,<br>you can try to get a new address in one hour.</p> <p>At this p&#097;ge you will receive the complete instructions how to buy the decryption software for restoring all your files.</p> <p>Also at this p&#097;ge you will be able to restore any one file for free to be sure "Cer&#98;er&nbsp;Decryptor" will help you.</p> <hr> <p>If your personal page is not available for a long period there is another way to open your personal page - installation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Internet browser (if you do not know wh&#097;t it is run the Internet&nbsp;Explorer);</li> <li>enter or copy the &#097;ddress <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/downlo&#097;d/download-easy.html.en</a> into the address bar of your browser &#097;nd press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor&nbsp;Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened &#097;fter the initialization;</li> <li>type or copy the address <br><span class="info">http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019</span><br> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the search bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Additional information:</strong></p> <p>You will find the instructi&#111;ns ("*_READ_THIS_FILE_*.hta") for rest&#111;ring y&#111;ur files in &#097;ny f&#111;lder with your encrypted files.</p> <p>The instructi&#111;ns "*_READ_THIS_FILE_*.hta" in the f&#111;lders with your encrypted files are not viruses! The instructions "*_READ_THIS_FILE_*.hta" will help you to decrypt your files.</p> <p>Remember! The w&#111;rst situ&#097;tion already happened and n&#111;w the future of your files depends on your determination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cer&#98;er&nbsp;Rans&#111;mware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cer&#98;er&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return updUrl('ar');">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cer&#98;er&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إضافية:</strong></p> <p>سوف تجد إرشادات استعادة الملفات الخاصة بك ("*_READ_THIS_FILE_*") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرشادات ("*_READ_THIS_FILE_*") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*_READ_THIS_FILE_*") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ موقف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cer&#98;er&nbsp;Rans&#111;mware”加密了。</p> <p>这意味着您的文件并没有损坏!您的文件只是被修改了,这个修改是可逆的,解密之前您无法使用您的文件。</p> <p>安全解密您文件的唯一方式是购买特别的解密软件“Cer&#98;er&nbsp;Decryptor”。</p> <p>任何使用第三方软件恢复您文件的方式对您的文件来说都将是致命的!</p> <hr> <p>您可以在您的个人页面上购买解密软件:</p> <p><span class="info"><span class="updating">请稍候...</span><a class="url" href="http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019</a><hr><a href="http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019" target="_blank">http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019</a></span></p> <p>如果这个页面无法打开,请 <span class="button" onclick="return updUrl('zh');">点击这里</span> 生成您个人页面的新地址。</p> <p>您将在这个页面上看到如何购买解密软件以恢复您的文件。</p> <p>您可以在这个页面使用“Cer&#98;er&nbsp;Decryptor”免费恢复任何文件。</p> <hr> <p>如果您的个人页面长期不可用,有其他方法可以打开您的个人页面 - 安装并使用 Tor 浏览器:</p> <ol> <li>使用您的上网浏览器(如果您不知道使用 Internet&nbsp;Explorer 的话);</li> <li>在浏览器的地址栏输入或�

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Contacts a large (1097) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
    "C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
      "C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_7V8V1J0_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3984
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_TJRTHZR_.txt
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:4320
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x510 0x4f0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_EET64NM_.txt

    Filesize

    1KB

    MD5

    1d5f487f5a63dd5c3b30d77fee0f95c1

    SHA1

    a0d17de014f07450fa01565011416b9ff8ab9383

    SHA256

    0b52bb99dd313e09a5b108b71f83f8f9fffa79bab1886f754fc0d7d7e2b0f62c

    SHA512

    e69360529cae6914fb8b918a5e5d7389897392117db166d5ffebd2647a26565ef2a20f6901d9555f1c29e630463353b4934ef8bac9a97913459bc8ef09b01f33

  • C:\Users\Admin\AppData\Local\Temp\nss98B8.tmp\System.dll

    Filesize

    11KB

    MD5

    4d3b19a81bd51f8ce44b93643a4e3a99

    SHA1

    35f8b00e85577b014080df98bd2c378351d9b3e9

    SHA256

    fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce

    SHA512

    b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622

  • C:\Users\Admin\AppData\Local\Temp\pastelists.dll

    Filesize

    180KB

    MD5

    f2048d943f0965532b8473c445991a5c

    SHA1

    09504be04e8e8980698350e5b0713ebb52963e44

    SHA256

    bc9d70d641f5bd5ff5d5686417ee9569d252bcd1f2ff6c5e4972babb9610ac43

    SHA512

    97d0fca60c89cd3c2381dc285b525d3221a32a871e58c3cbf971bed9eb65927ef9c98872a39c9d6f5a15b4e209e177ba3ac45b91797f900b5539c32087a360c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_YJ1HSXEO_.hta

    Filesize

    73KB

    MD5

    1925ac3c2c238f1724eca1cc95b06b48

    SHA1

    1a38c4da71a2327ea195addca44038400dc784f2

    SHA256

    4a060e4756fdc3a504fa6fdbc99d40fdd325758a6683ef285cafc21e6975d908

    SHA512

    7655918f80c35160c499d07a2839ded24e69ca0c057cd4bd00096213bf8bad83ab50de4bdcb4977f4d3d1ca73f388ab361e3a2075df55259adf7453e3483e92e

  • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_Z9RHPM0E_.jpeg

    Filesize

    150KB

    MD5

    d9a8355806fdbb48767768144949d737

    SHA1

    e06a13e7fba89aff634ad20f1b99822611d38ee7

    SHA256

    a415c606c79f484e1e37a88bac3f09f130db33a0cb08d1bef3122cb74f13bdb5

    SHA512

    040ddafc8eb0c0e7e3858fae579baf831ba35afd91463733dcc211e0f62b3cd1ce9ed1b0c1046573e2936943a8db896ad8cb404a56306f07ff2efe0bbcf304ba

  • memory/1656-15-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-17-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-18-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-19-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-22-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-24-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-26-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-16-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-13-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-399-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-416-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1656-427-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2976-10-0x0000000003040000-0x000000000306E000-memory.dmp

    Filesize

    184KB