Analysis
-
max time kernel
95s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 13:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe
-
Size
660KB
-
MD5
8a61458e6ac4304f8e1eb9af490f5eaf
-
SHA1
32c87c24746d0ee330f7d25b55b96c808d25f5b4
-
SHA256
12bace7eccbe03cf3a70d9d5579b2cdde4161f3e15aaee58ec3f39acd708f697
-
SHA512
4c382442207aa7ce4a6045afcade58ee508563fe147f09a2d5c7443d6be4ccea67e2c05cbca59a7a135922b0ed5a272988eaec68634ab142188f290bfe4c9565
-
SSDEEP
12288:keySOCn73uSYcAEDCNBcXkME8ICoeMhqO1:eSOC7uSnAEDJXnE7K691
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_JVNVITI8_.txt
http://hjhqmbxyinislkkt.onion/F084-5066-3253-05C4-05B8
http://hjhqmbxyinislkkt.1eagrj.top/F084-5066-3253-05C4-05B8
http://hjhqmbxyinislkkt.1a2xx3.top/F084-5066-3253-05C4-05B8
http://hjhqmbxyinislkkt.1gu5um.top/F084-5066-3253-05C4-05B8
http://hjhqmbxyinislkkt.1w5iy8.top/F084-5066-3253-05C4-05B8
http://hjhqmbxyinislkkt.1aajb7.top/F084-5066-3253-05C4-05B8
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_50D0Z_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1100) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 840 netsh.exe 3420 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE6A7.bmp" 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files\ 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\ 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\the bat! 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\ 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2220 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 1016 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2872 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2220 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe Token: SeCreatePagefilePrivilege 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe Token: 33 2796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2796 AUDIODG.EXE Token: SeDebugPrivilege 1016 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3668 wrote to memory of 840 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 85 PID 3668 wrote to memory of 840 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 85 PID 3668 wrote to memory of 840 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 85 PID 3668 wrote to memory of 3420 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 87 PID 3668 wrote to memory of 3420 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 87 PID 3668 wrote to memory of 3420 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 87 PID 3668 wrote to memory of 4872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 104 PID 3668 wrote to memory of 4872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 104 PID 3668 wrote to memory of 4872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 104 PID 3668 wrote to memory of 2872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 105 PID 3668 wrote to memory of 2872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 105 PID 3668 wrote to memory of 2872 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 105 PID 3668 wrote to memory of 3732 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 111 PID 3668 wrote to memory of 3732 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 111 PID 3668 wrote to memory of 3732 3668 2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe 111 PID 3732 wrote to memory of 1016 3732 cmd.exe 113 PID 3732 wrote to memory of 1016 3732 cmd.exe 113 PID 3732 wrote to memory of 1016 3732 cmd.exe 113 PID 3732 wrote to memory of 2220 3732 cmd.exe 115 PID 3732 wrote to memory of 2220 3732 cmd.exe 115 PID 3732 wrote to memory of 2220 3732 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_J3CB5UUE_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_1HUHWV_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2220
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x3ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD52319b19f22d468affa9f73a3be0dd070
SHA1d0de7382a8ca8d0c78c2df3f68e661e535231c26
SHA2569382908def217f7a23b566ee002a681bf74a9ba020ec3a9d8a2669faa4d14326
SHA5123d8dfb384116a7d1aeff6782322c0dade775597384df6e7a5cf7714cf334b85438737d502f918a154333573aa746fc132d2d844cbe50ada19c92b64532976d26
-
Filesize
1KB
MD5271a7e5df968e1f3b0e846c2f71d3560
SHA1120108b87d925d7db448fef06218e06bbf49ad82
SHA2568105b3c08bb8c9409ef02e2a0ba31a57a008cba3f5f33c09053ab1fa8f99f90e
SHA51242e7746458f8d92e5ab7238ec30ad02946ad14b272cf46da268cce5a74eda12fcf51aae3d57a3a0399eafdc83654e32b170a71baa6cc34a3c24d2e639f1df9e3
-
Filesize
150KB
MD5fcdd0450f16c7a86ebe9db35306723c0
SHA1be6c750cda6e3660d86b37e910a446e9d7394594
SHA25607f9516e920b39f685357f0087acc70acfdb1ee1e2af4db7cae5aa0f6f30a90f
SHA512c34bab5569f45279ab3a5bfd88f2c3a030bb31d2054a6b8f00c4b92bc0606895abb8075679865e1ad2ae88b77e9e09e8bf450528a1117f54fb4b12a2f65fa98e