Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 02:26
Static task
static1
Behavioral task
behavioral1
Sample
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
Resource
win10v2004-20241007-en
General
-
Target
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe
-
Size
395KB
-
MD5
9b55e3dbb34b1d422fe46487f42019a6
-
SHA1
ecc8ee4fe83f00d2b307a17ce4a323646aece2e0
-
SHA256
fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6
-
SHA512
8a0fca1dc36bf9053eab2a2c4e549e83e192b2b34e8ef814e031274d37157d13b2d02befb795195acb28af1a201a39dcb9356f2dad2187aaf4f5e86de051ae45
-
SSDEEP
6144:j/44D6oSKZyjhi7+jxF07ETxj85zdBdy+66lmppOLZB5wr:rp67KUA+jxG7eIHB6QLF+
Malware Config
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/A0F7-E3E7-F1B4-0072-B5AA
http://bqyjebfh25oellur.onion.cab/A0F7-E3E7-F1B4-0072-B5AA
http://bqyjebfh25oellur.onion.nu/A0F7-E3E7-F1B4-0072-B5AA
http://bqyjebfh25oellur.onion.link/A0F7-E3E7-F1B4-0072-B5AA
http://bqyjebfh25oellur.tor2web.org/A0F7-E3E7-F1B4-0072-B5AA
http://bqyjebfh25oellur.onion/A0F7-E3E7-F1B4-0072-B5AA
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" autochk.exe -
Contacts a large (529) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation autochk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\autochk.lnk fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\autochk.lnk autochk.exe -
Executes dropped EXE 3 IoCs
pid Process 2996 autochk.exe 5012 autochk.exe 3720 autochk.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autochk = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\autochk = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autochk = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" autochk.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\autochk = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" autochk.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp894F.bmp" autochk.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml autochk.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html autochk.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE autochk.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt autochk.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE autochk.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt autochk.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url autochk.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE autochk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini autochk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autochk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autochk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autochk.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5084 cmd.exe 1188 PING.EXE 4880 cmd.exe 1504 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4504 taskkill.exe 3796 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" autochk.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\\autochk.exe\"" fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop autochk.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings autochk.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1188 PING.EXE 1504 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe 2996 autochk.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe Token: SeDebugPrivilege 2996 autochk.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 5012 autochk.exe Token: SeDebugPrivilege 3720 autochk.exe Token: 33 1656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1656 AUDIODG.EXE Token: SeDebugPrivilege 3796 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2996 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 1436 wrote to memory of 2996 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 1436 wrote to memory of 2996 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 83 PID 1436 wrote to memory of 5084 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 1436 wrote to memory of 5084 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 1436 wrote to memory of 5084 1436 fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe 84 PID 5084 wrote to memory of 4504 5084 cmd.exe 86 PID 5084 wrote to memory of 4504 5084 cmd.exe 86 PID 5084 wrote to memory of 4504 5084 cmd.exe 86 PID 5084 wrote to memory of 1188 5084 cmd.exe 88 PID 5084 wrote to memory of 1188 5084 cmd.exe 88 PID 5084 wrote to memory of 1188 5084 cmd.exe 88 PID 2996 wrote to memory of 1476 2996 autochk.exe 106 PID 2996 wrote to memory of 1476 2996 autochk.exe 106 PID 1476 wrote to memory of 644 1476 msedge.exe 107 PID 1476 wrote to memory of 644 1476 msedge.exe 107 PID 2996 wrote to memory of 4868 2996 autochk.exe 108 PID 2996 wrote to memory of 4868 2996 autochk.exe 108 PID 2996 wrote to memory of 464 2996 autochk.exe 109 PID 2996 wrote to memory of 464 2996 autochk.exe 109 PID 464 wrote to memory of 1156 464 msedge.exe 110 PID 464 wrote to memory of 1156 464 msedge.exe 110 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 3012 1476 msedge.exe 111 PID 1476 wrote to memory of 1792 1476 msedge.exe 112 PID 1476 wrote to memory of 1792 1476 msedge.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exe"C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb1a4f46f8,0x7ffb1a4f4708,0x7ffb1a4f47184⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:84⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:14⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:14⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:14⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4280 /prefetch:84⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4280 /prefetch:84⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:14⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:14⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:14⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:14⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10908881298443623087,18148694601444928012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2296 /prefetch:14⤵PID:5596
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bqyjebfh25oellur.onion.to/A0F7-E3E7-F1B4-0072-B5AA?auto3⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1a4f46f8,0x7ffb1a4f4708,0x7ffb1a4f47184⤵PID:1156
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4700
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "autochk.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4880 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "autochk.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1504
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1188
-
-
-
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exeC:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
C:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exeC:\Users\Admin\AppData\Roaming\{319DC660-6678-56C0-9D6D-36F1D71D81BB}\autochk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x418 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Filesize19KB
MD54f51e07b38475efda0ff5aed2095aa09
SHA15ea3d213d9e96bff90ce5d191c89707c2d70f951
SHA256eaf8db137218270657d66df6a70933b2d49f72935172cf0630253790b733d29f
SHA5128067dad864421f479c5f2f0967570ebf9be48e426b7cc3944dc378eb71710d1fa74110dc976bb326262ce19c29080720c84d62091d6a24da79fcd98f659e57f3
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
Filesize10KB
MD58b178d870959a0b05f155ce1264e4958
SHA10324a304d617f10cdcb2d410d72f6598176fa706
SHA25693bcc438edc503c4b590e6b7b3b0911fe45bcd62ec3e12be0727bd1de89889f3
SHA51233de2f6c0e549192272f0494f92bc0a0cfa702f41d4f8633d59dbb75579d6491b2e70401898cdb68461b9d0d9a12f8bca13b79c458a784be1f6b1ae8676bc3a4
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url
Filesize88B
MD59d1c0510d8689a48cd1276b45ed82c65
SHA17ad9823eac5bf1a61b4248e92078aa8033744049
SHA2564cf2b75568a24c896d380e06834404631eeff18d2a09ae52d2b3a8fe34917ee8
SHA51215a763e446142e983203a73a53e4f5884e5cab8dcf8bf504347dfbeeffeafc3b020b73fe06237e315797e227a5ce52e44affc3c7f7633847eb398901989e5af7
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs
Filesize246B
MD5d3e80e1e6dffc81a2e72c05c9b482fc6
SHA1bdcca42f5f612531bc5a4d14af649fa8a80bab34
SHA256f7902386a8d4572575441be399933b81fa4a16090925ef49a3914cff256f806b
SHA5123e5bfc95e0b3c80b6edf8d63157456f3a918d93db972ed4868539eabf63a1e737dbbb8d320e9f9e490d08aa7f7458bad67e8220f7df3e3f725b01b44b0564680
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
6KB
MD52beed7243c7c6d8c63b2088a9a61e7aa
SHA1c5349b316e951ccb2b2df3a5da07a85012bfd83b
SHA256ff1f78a2d7bf4ee11525221d1b63e1c633e04aeeca6b9caa7a5f9f29718f19f8
SHA51202feb4beec4b9c231213c9ef8a16da32fe02f65dabf4b9586aae28712d87742c7eaa1f5dcb899b05c5d19ae955df4884acfc1a25ca5a95807bdd863312390b23
-
Filesize
5KB
MD58b0bde327f128c30ef15011be5cf60b0
SHA155fe3ef19a1384a02b6ab7205842e745fbc154a3
SHA2568007ec11213087cdcf5562a6efaab4adf56fe337f45f253e606a6c99bd15aab7
SHA512cc90564c4095e38c2095c288ea14dabeb0cf5c674ba17c2df4e739523fbad4c2ce7eaaa885c5d274f66e1c59dae2c66c2866bb4ecf1dc3ba1ac4024917fec0d1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e541b08ad2d58375e4e0704303d5b354
SHA1b70f203a7bb032a1b9c92e123ba4829c7d2a524e
SHA256dddd16874abb01a72d94eb8821a8bbd4df41075f4445a165873f18a4ae1b4f3a
SHA51224878bfd12d0af9d793f9457d997900cb9163dab7a1b8d2a9d609d2b7165a783128592e7908f75ee0b507cffaca8fcb90d202e82ba2907e2fae0e98749c64748
-
Filesize
1KB
MD5f2bfe71ad58aaf315a29ec77d3e736f0
SHA1d0134341dbe75af9b99ee45fb1f583b1c84c9b2c
SHA256fa4dd5392504a4f9fc154fdd0326bda646b5a59fc7926706a79476f10042dbcc
SHA5129735914baa606a8e8a955be78358c3689b44654dad05fb1d057bff6e937e7135027d4e0c5f19e276f297431ea469994ec083d297008546fc8035525005e1fdd4
-
Filesize
395KB
MD59b55e3dbb34b1d422fe46487f42019a6
SHA1ecc8ee4fe83f00d2b307a17ce4a323646aece2e0
SHA256fe95cbedb9018ba0dbd0d78a82110a775a131c57f627e620171300f1fe0a40c6
SHA5128a0fca1dc36bf9053eab2a2c4e549e83e192b2b34e8ef814e031274d37157d13b2d02befb795195acb28af1a201a39dcb9356f2dad2187aaf4f5e86de051ae45