Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2025 06:58
Static task
static1
Behavioral task
behavioral1
Sample
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe
Resource
win10v2004-20250207-en
General
-
Target
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe
-
Size
248KB
-
MD5
46d0b73129531db5d366e919885cff04
-
SHA1
93570d04e57a410374085dd495f99a550451e8c2
-
SHA256
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd
-
SHA512
1b5c21964bf693d04d07bb1f960e7ac9ffd4361d571c1292e2cbc7a653092168378771c09f06ec01a9b3582d14cdd22009004eaef41fecafadfbe277ff3a9daa
-
SSDEEP
3072:Y6sRpXsj2DDca5Tg2/clFaJhyJgrZbONQhVVUvUgqa4r6yqGOCtC9dnBtTXWGwqb:Y6sRp8K8eg2UlE70QZUvUGKIZZtIqb
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_EWM1MUNS_.txt
http://hjhqmbxyinislkkt.onion/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1eeyaj.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1eagrj.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1a2xx3.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1gu5um.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1w5iy8.top/03B2-992C-5C6B-05C4-049E
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_2V4B_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1110) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file 1 IoCs
flow pid Process 2917 5008 Process not Found -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1196 netsh.exe 3856 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp314C.bmp" d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files\ d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\ d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\program files (x86)\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\ d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1452 MicrosoftEdgeUpdate.exe 2296 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 1044 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1940 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2296 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe Token: SeCreatePagefilePrivilege 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe Token: 33 3212 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3212 AUDIODG.EXE Token: SeDebugPrivilege 1044 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1196 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 90 PID 4444 wrote to memory of 1196 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 90 PID 4444 wrote to memory of 1196 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 90 PID 4444 wrote to memory of 3856 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 92 PID 4444 wrote to memory of 3856 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 92 PID 4444 wrote to memory of 3856 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 92 PID 4444 wrote to memory of 1496 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 101 PID 4444 wrote to memory of 1496 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 101 PID 4444 wrote to memory of 1496 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 101 PID 4444 wrote to memory of 1940 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 102 PID 4444 wrote to memory of 1940 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 102 PID 4444 wrote to memory of 1940 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 102 PID 4444 wrote to memory of 644 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 110 PID 4444 wrote to memory of 644 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 110 PID 4444 wrote to memory of 644 4444 d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe 110 PID 644 wrote to memory of 1044 644 cmd.exe 112 PID 644 wrote to memory of 1044 644 cmd.exe 112 PID 644 wrote to memory of 1044 644 cmd.exe 112 PID 644 wrote to memory of 2296 644 cmd.exe 113 PID 644 wrote to memory of 2296 644 cmd.exe 113 PID 644 wrote to memory of 2296 644 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe"C:\Users\Admin\AppData\Local\Temp\d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_W9IG_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_86ENI2B_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2296
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjc0ODQ5NTUyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1452
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD552c7cac43bcb4b7aa71a25393da9766d
SHA1622342a7c6e5b37a251723d8472f81b4b77844eb
SHA256267809efaec2b81766723a4141656aed4f03c8fe4f855ab27e533797095bbf27
SHA512122c35a9790f402539bf98ae20dbeff4e87e40cac37a94788dde7cb90f840fc2d27fea24afec6d26be5b11cf8d3e64ea6f4d5bb54a84dfc501b1c72364585159
-
Filesize
150KB
MD50511cac5f28a0b554c393b0240e60d22
SHA142eb8b9fea24a6943a075da111a048850fad7a32
SHA256411dfdda617f3616157cf9e8d1db1e4078a7db3e7a322f2fd266ce587baa9ece
SHA512445408d28a0ada3f834ecaf1134316678df1a2ceaa0a2cceb9956c9f9a602c725c8d61404e30a4eab179410f42175be22cef008f2cdd8cf3645439757a9d2181
-
Filesize
1KB
MD571a8e083bd0cf9e41e429efb487dcd12
SHA105914d890a795075bcab9553f3a0320abac33025
SHA2565434ed155c6ee5b9fc17f082c715e5406416a7b2f27ea16c038e4942e0159ace
SHA512416a35d9b1e26eae502517123d6c4b354898edbfeabceaeb20af128710e088e676a2d6d9724009cde438a2015fe561761acd7b3d37dd226b0017cfb87e370bb5