Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 04:48
Static task
static1
Behavioral task
behavioral1
Sample
0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe
Resource
win10v2004-20241007-en
General
-
Target
0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe
-
Size
395KB
-
MD5
356737a81f926b2b68c87eb73b6d81d0
-
SHA1
25bf0d17b4b5e8000ca5b6bedf0ad821d1aae482
-
SHA256
0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaa
-
SHA512
4919572a24e27eade49cd6cefa436e123284c68a9da14e7ad041bbccb5b1a5a8ca186179728f5ddb6f08147c282874dafc18d108bfd7e46f4dea7ec454600b99
-
SSDEEP
6144:j/44D6oSKZyjhi7+jxF07ETxj85zdBdy+66lmppOLZB5wj:rp67KUA+jxG7eIHB6QLFu
Malware Config
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.eventsresg.info/A568-D381-1B73-0072-B086
http://4kqd3hmqgptupi3p.eatsdeal.black/A568-D381-1B73-0072-B086
http://4kqd3hmqgptupi3p.spendfly.red/A568-D381-1B73-0072-B086
http://4kqd3hmqgptupi3p.nextask.loan/A568-D381-1B73-0072-B086
http://4kqd3hmqgptupi3p.onion.to/A568-D381-1B73-0072-B086
http://4kqd3hmqgptupi3p.onion/A568-D381-1B73-0072-B086
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" mavinject.exe -
Contacts a large (528) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mavinject.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\mavinject.lnk 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\mavinject.lnk mavinject.exe -
Executes dropped EXE 2 IoCs
pid Process 2728 mavinject.exe 4296 mavinject.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mavinject = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mavinject = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mavinject = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" mavinject.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mavinject = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" mavinject.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp9F19.bmp" mavinject.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini mavinject.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt mavinject.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE mavinject.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url mavinject.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE mavinject.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE mavinject.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs mavinject.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml mavinject.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini mavinject.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mavinject.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mavinject.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3372 cmd.exe 1560 PING.EXE 1688 cmd.exe 768 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4708 taskkill.exe 3412 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop mavinject.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\\mavinject.exe\"" mavinject.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings mavinject.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1560 PING.EXE 768 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe 2728 mavinject.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe Token: SeDebugPrivilege 2728 mavinject.exe Token: SeDebugPrivilege 4708 taskkill.exe Token: SeDebugPrivilege 4296 mavinject.exe Token: 33 2428 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2428 AUDIODG.EXE Token: SeDebugPrivilege 3412 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 2728 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 82 PID 592 wrote to memory of 2728 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 82 PID 592 wrote to memory of 2728 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 82 PID 592 wrote to memory of 3372 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 83 PID 592 wrote to memory of 3372 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 83 PID 592 wrote to memory of 3372 592 0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe 83 PID 3372 wrote to memory of 4708 3372 cmd.exe 85 PID 3372 wrote to memory of 4708 3372 cmd.exe 85 PID 3372 wrote to memory of 4708 3372 cmd.exe 85 PID 3372 wrote to memory of 1560 3372 cmd.exe 87 PID 3372 wrote to memory of 1560 3372 cmd.exe 87 PID 3372 wrote to memory of 1560 3372 cmd.exe 87 PID 2728 wrote to memory of 5060 2728 mavinject.exe 97 PID 2728 wrote to memory of 5060 2728 mavinject.exe 97 PID 5060 wrote to memory of 4220 5060 msedge.exe 98 PID 5060 wrote to memory of 4220 5060 msedge.exe 98 PID 2728 wrote to memory of 1488 2728 mavinject.exe 99 PID 2728 wrote to memory of 1488 2728 mavinject.exe 99 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 1900 5060 msedge.exe 100 PID 5060 wrote to memory of 4324 5060 msedge.exe 101 PID 5060 wrote to memory of 4324 5060 msedge.exe 101 PID 5060 wrote to memory of 3100 5060 msedge.exe 102 PID 5060 wrote to memory of 3100 5060 msedge.exe 102 PID 5060 wrote to memory of 3100 5060 msedge.exe 102 PID 5060 wrote to memory of 3100 5060 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe"C:\Users\Admin\AppData\Local\Temp\0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\mavinject.exe"C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\mavinject.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb331246f8,0x7ffb33124708,0x7ffb331247184⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:24⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:34⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:84⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:14⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:14⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:14⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:14⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:84⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:84⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:14⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:14⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:14⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:14⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4779042682854605888,1219843235984407084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:14⤵PID:396
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.eventsresg.info/A568-D381-1B73-0072-B086?auto3⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb331246f8,0x7ffb33124708,0x7ffb331247184⤵PID:4036
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1184
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "mavinject.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\mavinject.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1688 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "mavinject.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:768
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "0744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaaN.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1560
-
-
-
C:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\mavinject.exeC:\Users\Admin\AppData\Roaming\{119B54CC-A93F-97E8-FF36-2FE4920876BE}\mavinject.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x338 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2428
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD52c8dc8fb4f4b760042d32f43e410879d
SHA1694e0557fa168764d01fe0df032eb55e65e7c540
SHA2564ba4457c00f55ec9ca3a13e74652df0f4a123f161e6ee1717826b7757d6bfdd6
SHA512a78d100e11cdad7164b1f57324e1979919eb09834dbb70137002c2c6d365470482ea742247b0561eae504af860480bfa5c2f08da840a7f56405178cd96fbf39a
-
Filesize
6KB
MD588ddbe8f33ca21cfab795891032b00ea
SHA12ce83cc0bd18d8b79482c3e227087f9d626daa0f
SHA2566d9f9427e491f14513ebaf6e55199681fe16b6cf56ba52084d33c271c2bfe342
SHA5123eb81b81aae7682f8509e119db3891235376a41802fd85c5766e7a56acf754038c3f38b5b274d7c344d66fa327bc14755c854f237cdb2aed599bbdb49fd90ca2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52756e8d00f3453b272ec117807146299
SHA1cf14e8cf0241124ea580ad59beff5250faba79df
SHA256544b31c0d883974784acf5705ebfd6d68df44bfc7f823fba6e411edca0eff4fc
SHA5120622c1edd4648256fc8877f96c663517b7718fd19de1c067e0696aed1e9388ca6c021bc1eb8a010f20c157c48e4ed6dea8eb9ce66ab16ce30a93762a206296e4
-
Filesize
1KB
MD5b05401cca181f53116de69803f228176
SHA15eee16bd180b1f77abb1624b13ce60fb2d5387ab
SHA256519c0ef23bc0d3f9463eb30dd83f5454814a8fe9828c7aee451a6ccca8015521
SHA5126ff1b0fb87fa41dd8aa1a0edf7b80b20c2d80d048bc47fd6d4c88516aaadd8789ef985172056944ac6f0640316711f9449dea9dba84bc1e8dcbdf7109fbdbede
-
Filesize
395KB
MD5356737a81f926b2b68c87eb73b6d81d0
SHA125bf0d17b4b5e8000ca5b6bedf0ad821d1aae482
SHA2560744805c94002f1981be3d5e25bd8f4ec2ccf16386d5eb786023b3a84f75cbaa
SHA5124919572a24e27eade49cd6cefa436e123284c68a9da14e7ad041bbccb5b1a5a8ca186179728f5ddb6f08147c282874dafc18d108bfd7e46f4dea7ec454600b99
-
Filesize
19KB
MD5bff3628c4c70bc2e3df47627838fba37
SHA16c8010d528e20f3fe51b8e3645731eac6da993f3
SHA256936f1203937548e6ea5855fa208a4b924ea0ff214c678140cba213cbc4df1f58
SHA5121153f8822d343d76e6718dc7b08515200c67b026c85bec96f73233f146004f96c5140e7053e39b7520ba40287161ccb785c0889cc91bbf057756ff403744f327
-
Filesize
10KB
MD51d0ae99e817eeae7cce4ee9dd1e9471c
SHA1f0adee6fdc103a43bcb1c7f54e7e653defdb71f5
SHA256ac280efef5f5b0167e3704ed4c102ee59b9e575136807edc48ad63cde5d1965c
SHA5120e2ad65ff7ad083ac66edeb5e90e5eff44a77a07ab817061f5cc683692e2522993ebd646b477cd80f567588e98eb8f80f7762d60eab7263633fe8bd25921dd32
-
Filesize
95B
MD5d43dcc76e9c9880cd4fd5cf387818152
SHA13faff55f7c34e3d8ef78b1f4204c5d9b53d6d3b9
SHA25666a1562d51a861a8e2e68c1fab819cfbd1c339f02f76179a93f5dfa2b0141156
SHA5124e845c14ee78828078723346420a42830f2f24937a55f94ff2af286307a1d37ab07e1819289c0076ece2e470415e9e2767b9b0a705f49d86d736d3b5c2e76755
-
Filesize
246B
MD5d3e80e1e6dffc81a2e72c05c9b482fc6
SHA1bdcca42f5f612531bc5a4d14af649fa8a80bab34
SHA256f7902386a8d4572575441be399933b81fa4a16090925ef49a3914cff256f806b
SHA5123e5bfc95e0b3c80b6edf8d63157456f3a918d93db972ed4868539eabf63a1e737dbbb8d320e9f9e490d08aa7f7458bad67e8220f7df3e3f725b01b44b0564680