Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 02:34
Static task
static1
Behavioral task
behavioral1
Sample
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
Resource
win10v2004-20241007-en
General
-
Target
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
-
Size
395KB
-
MD5
9b55e3dbb34b1d422fe46487f42019a6
-
SHA1
ecc8ee4fe83f00d2b307a17ce4a323646aece2e0
-
SHA256
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6
-
SHA512
8a0fca1dc36bf9053eab2a2c4e549e83e192b2b34e8ef814e031274d37157d13b2d02befb795195acb28af1a201a39dcb9356f2dad2187aaf4f5e86de051ae45
-
SSDEEP
6144:j/44D6oSKZyjhi7+jxF07ETxj85zdBdy+66lmppOLZB5wr:rp67KUA+jxG7eIHB6QLF+
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/704E-7882-F2C8-0072-BB2F
http://bqyjebfh25oellur.onion.cab/704E-7882-F2C8-0072-BB2F
http://bqyjebfh25oellur.onion.nu/704E-7882-F2C8-0072-BB2F
http://bqyjebfh25oellur.onion.link/704E-7882-F2C8-0072-BB2F
http://bqyjebfh25oellur.tor2web.org/704E-7882-F2C8-0072-BB2F
http://bqyjebfh25oellur.onion/704E-7882-F2C8-0072-BB2F
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" pcaui.exe -
Contacts a large (529) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation pcaui.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\pcaui.lnk pcaui.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\pcaui.lnk fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe -
Executes dropped EXE 2 IoCs
pid Process 1884 pcaui.exe 4148 pcaui.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" pcaui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" pcaui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB91A.bmp" pcaui.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml pcaui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt pcaui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini pcaui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html pcaui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs pcaui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE pcaui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt pcaui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE pcaui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs pcaui.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini pcaui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcaui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcaui.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3904 PING.EXE 4588 cmd.exe 3264 PING.EXE 3468 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3120 taskkill.exe 2536 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop pcaui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" pcaui.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\\pcaui.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings pcaui.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3264 PING.EXE 3904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe 1884 pcaui.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Token: SeDebugPrivilege 1884 pcaui.exe Token: SeDebugPrivilege 3120 taskkill.exe Token: SeDebugPrivilege 4148 pcaui.exe Token: 33 3520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3520 AUDIODG.EXE Token: SeDebugPrivilege 2536 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1884 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 2004 wrote to memory of 1884 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 2004 wrote to memory of 1884 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 2004 wrote to memory of 4588 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 2004 wrote to memory of 4588 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 2004 wrote to memory of 4588 2004 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 4588 wrote to memory of 3120 4588 cmd.exe 86 PID 4588 wrote to memory of 3120 4588 cmd.exe 86 PID 4588 wrote to memory of 3120 4588 cmd.exe 86 PID 4588 wrote to memory of 3264 4588 cmd.exe 88 PID 4588 wrote to memory of 3264 4588 cmd.exe 88 PID 4588 wrote to memory of 3264 4588 cmd.exe 88 PID 1884 wrote to memory of 644 1884 pcaui.exe 105 PID 1884 wrote to memory of 644 1884 pcaui.exe 105 PID 644 wrote to memory of 2948 644 msedge.exe 106 PID 644 wrote to memory of 2948 644 msedge.exe 106 PID 1884 wrote to memory of 5064 1884 pcaui.exe 107 PID 1884 wrote to memory of 5064 1884 pcaui.exe 107 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 164 644 msedge.exe 108 PID 644 wrote to memory of 3612 644 msedge.exe 109 PID 644 wrote to memory of 3612 644 msedge.exe 109 PID 644 wrote to memory of 1060 644 msedge.exe 110 PID 644 wrote to memory of 1060 644 msedge.exe 110 PID 644 wrote to memory of 1060 644 msedge.exe 110 PID 644 wrote to memory of 1060 644 msedge.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\pcaui.exe"C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\pcaui.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbff546f8,0x7ffdbff54708,0x7ffdbff547184⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:24⤵PID:164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:34⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:84⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:14⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:14⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:14⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:14⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2596 /prefetch:14⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:84⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:84⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:14⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:14⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:14⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:14⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14819708922384511797,8571677293329492260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:14⤵PID:1180
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bqyjebfh25oellur.onion.to/704E-7882-F2C8-0072-BB2F?auto3⤵PID:656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbff546f8,0x7ffdbff54708,0x7ffdbff547184⤵PID:4144
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1620
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "pcaui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\pcaui.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3468 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "pcaui.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3904
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3264
-
-
-
C:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\pcaui.exeC:\Users\Admin\AppData\Roaming\{9D3B20D5-7968-97DE-9EE7-58760A9EBF19}\pcaui.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x3bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
176B
MD5ab5fa7a4e728268bd7e896056c6972c0
SHA1cc59ac7facb72637e6f220a60d38d4bf053c4129
SHA256b579c7f815642db91bd3705d40762b948ec7e691017a2a28ba19bcce29a093a2
SHA5123e35aaea90d9414c4d4529a3a7f68ae3cb67849e8d3ac119f4a4a88988a4f76a73c4f4a0e37dc3f7ba3df207d51816527d8d5d3009dd985be9539c0feb9cf821
-
Filesize
5KB
MD50462454b2b644de0adf9d0af2919d56a
SHA1bc7c37ceeeacab622166cd8c0091b966af30f42c
SHA2560266b3a5bab09c81063ba428ec61c3b146a76ccba6a8449f2b67e164b7a38960
SHA512df5b320e35cfa6d49753e2e72d1d0b1ad4bb907c47f5296d35a026995bbdebbc78d5357deea8deb25c13cd9c095956960eccde35e2d92465d4672e0c6b46f9f0
-
Filesize
6KB
MD5e9bd625f034558cdb9146d9c814e4306
SHA1323de5efc069ff3468a3f7ee25b4d136515200ca
SHA256881d055c6c527e5afb13098412780edbb30a44203887cbf32c1eed087d3cc741
SHA512f0dc27656f943d1ae2bdbe5e0fecd081eabb474f11093a507abf8c44681c1a39f69781e4fa7cef09a599446dabc78c3c96775ab46ca63c089fea33dbed415fd1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd31600daa49f9ae2402e579d2cae2a0
SHA104a4cc22a80648c0867ff117a781cf41038da249
SHA256e6815d38137629502ef33fc3c7c53a2368b6b9a548230f85449123f74d48da70
SHA512405c6e4701ca0b17c00a9509c1bfd93e33a07245cd200564b904ab59b9316f150cf839c3f69cd3c628c332945e1ac39fc56e28b2d93d35a05fb659c49ab742bb
-
Filesize
1KB
MD54a446f1eb309ac5a2f3dba13ea983d22
SHA15823f215f332e6984aa1fb648f3d0888e139d6ba
SHA256121da5755ddb6c460475f33af2ddfd7f2cd3e6f23e296bfb482535024c4fe340
SHA512bfddde8d9e0720726545051dc622b1c5abc6aaf1e1b3539f580d60027d73c0a07e251f9a6b567fb43204a962f9ffafc4ca4ae888d99ed8abc11632e9db337def
-
Filesize
395KB
MD59b55e3dbb34b1d422fe46487f42019a6
SHA1ecc8ee4fe83f00d2b307a17ce4a323646aece2e0
SHA256fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6
SHA5128a0fca1dc36bf9053eab2a2c4e549e83e192b2b34e8ef814e031274d37157d13b2d02befb795195acb28af1a201a39dcb9356f2dad2187aaf4f5e86de051ae45
-
Filesize
19KB
MD5b973074359e5e9531bda4670d6a638d8
SHA18fbdf382dddf7d20a2113874b860280e33d578ae
SHA2560858323807e5f1bb94e027a47c6f192e83d1f0eca1e987e989db4fa3183dbc76
SHA512779ab20f32c6d65a0bd5de577f2aad193032b461ad26c3872d8aae549b78f2eeab07895083e2aa1d2eb19e76fcd3a86cf251e69971bbc9ed3cd059a5cdda6854
-
Filesize
10KB
MD5811af5f3f1c50d70a0a301ce6e6cc899
SHA135e9a0b3ec8a545ab11ae8d276eb531549d56055
SHA256689b133a01bacc23b5868e3106574a40d3ca2a76f6edf7d7e680d6f7da5b14f6
SHA5120e2ec544e67cff4d47723594358b60cd57d145773752bd9271844927f3f25641dbb1a5fa54c7624edfd7cf0e8954956c02cadd8fb1fd80d1e35823ee6f0f163a
-
Filesize
88B
MD5b5a8ff603f008191a29a80c1087ee6fb
SHA19e2f498a91b9e0365150221689d6d81507e85970
SHA256f311997d23afb8d19021b3bb7d638e91a83c99d303a802ea63fafa0edd566209
SHA51269dc04571da08d909533d822eefaaa9de4dde8fbb2b58f8f2037f99ca34f825b5b30944d9795aab32a033f9f49c59a16dc42821248907d639cb7a10d475f57ad
-
Filesize
246B
MD5d3e80e1e6dffc81a2e72c05c9b482fc6
SHA1bdcca42f5f612531bc5a4d14af649fa8a80bab34
SHA256f7902386a8d4572575441be399933b81fa4a16090925ef49a3914cff256f806b
SHA5123e5bfc95e0b3c80b6edf8d63157456f3a918d93db972ed4868539eabf63a1e737dbbb8d320e9f9e490d08aa7f7458bad67e8220f7df3e3f725b01b44b0564680