Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 14:29
Static task
static1
Behavioral task
behavioral1
Sample
3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe
Resource
win10v2004-20250207-en
General
-
Target
3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe
-
Size
324KB
-
MD5
5610c73bff6be1ff1b14bdbdb14a6410
-
SHA1
fc5bdaa888ba8c857e2280116a4482fd9c77e014
-
SHA256
3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c
-
SHA512
c1098c740e83c39a3e6ca031921ed1236d15491c1d84a66c6c095f646141849068f7f1e1e65590665b09454cfdbf404fa1657e6926489c624ac377baee7ed183
-
SSDEEP
6144:N+gqC4Wta3HEkrmC15wFeoxKhbgnKucl/r888888888888W88888888888I:krCHa33rreFebM2r888888888888W887
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/1707-EF76-D78D-0072-D141
http://bqyjebfh25oellur.onion.cab/1707-EF76-D78D-0072-D141
http://bqyjebfh25oellur.onion.nu/1707-EF76-D78D-0072-D141
http://bqyjebfh25oellur.onion.link/1707-EF76-D78D-0072-D141
http://bqyjebfh25oellur.tor2web.org/1707-EF76-D78D-0072-D141
http://bqyjebfh25oellur.onion/1707-EF76-D78D-0072-D141
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" mfpmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe -
Contacts a large (534) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file 1 IoCs
flow pid Process 1276 1092 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\International\Geo\Nation mfpmp.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\mfpmp.lnk 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\mfpmp.lnk mfpmp.exe -
Executes dropped EXE 2 IoCs
pid Process 4852 mfpmp.exe 4332 mfpmp.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mfpmp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mfpmp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mfpmp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" mfpmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mfpmp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" mfpmp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp805.bmp" mfpmp.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml mfpmp.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt mfpmp.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE mfpmp.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html mfpmp.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE mfpmp.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs mfpmp.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE mfpmp.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE mfpmp.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt mfpmp.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url mfpmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfpmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfpmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5904 PING.EXE 1704 cmd.exe 3344 PING.EXE 1124 MicrosoftEdgeUpdate.exe 968 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4332 taskkill.exe 3144 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\Desktop 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe Key created \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\Desktop mfpmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\\mfpmp.exe\"" mfpmp.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000_Classes\Local Settings mfpmp.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3344 PING.EXE 5904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe 4852 mfpmp.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe Token: SeDebugPrivilege 4852 mfpmp.exe Token: SeDebugPrivilege 4332 taskkill.exe Token: SeDebugPrivilege 4332 mfpmp.exe Token: 33 5404 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5404 AUDIODG.EXE Token: SeDebugPrivilege 3144 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4852 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 87 PID 1168 wrote to memory of 4852 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 87 PID 1168 wrote to memory of 4852 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 87 PID 1168 wrote to memory of 1704 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 88 PID 1168 wrote to memory of 1704 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 88 PID 1168 wrote to memory of 1704 1168 3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe 88 PID 1704 wrote to memory of 4332 1704 cmd.exe 90 PID 1704 wrote to memory of 4332 1704 cmd.exe 90 PID 1704 wrote to memory of 4332 1704 cmd.exe 90 PID 1704 wrote to memory of 3344 1704 cmd.exe 94 PID 1704 wrote to memory of 3344 1704 cmd.exe 94 PID 1704 wrote to memory of 3344 1704 cmd.exe 94 PID 4852 wrote to memory of 6028 4852 mfpmp.exe 110 PID 4852 wrote to memory of 6028 4852 mfpmp.exe 110 PID 6028 wrote to memory of 6040 6028 msedge.exe 111 PID 6028 wrote to memory of 6040 6028 msedge.exe 111 PID 4852 wrote to memory of 3732 4852 mfpmp.exe 112 PID 4852 wrote to memory of 3732 4852 mfpmp.exe 112 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2184 6028 msedge.exe 114 PID 6028 wrote to memory of 2180 6028 msedge.exe 115 PID 6028 wrote to memory of 2180 6028 msedge.exe 115 PID 6028 wrote to memory of 2316 6028 msedge.exe 116 PID 6028 wrote to memory of 2316 6028 msedge.exe 116 PID 6028 wrote to memory of 2316 6028 msedge.exe 116 PID 6028 wrote to memory of 2316 6028 msedge.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe"C:\Users\Admin\AppData\Local\Temp\3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\mfpmp.exe"C:\Users\Admin\AppData\Roaming\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\mfpmp.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9bef46f8,0x7ffb9bef4708,0x7ffb9bef47184⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:24⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:84⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:14⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:14⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:14⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:84⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:84⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:14⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:14⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:14⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16283516349611198759,15639778592198279375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:14⤵PID:5312
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bqyjebfh25oellur.onion.to/1707-EF76-D78D-0072-D141?auto3⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb9bef46f8,0x7ffb9bef4708,0x7ffb9bef47184⤵PID:5104
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1336
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "mfpmp.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\mfpmp.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:968 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "mfpmp.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5904
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "3c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3344
-
-
-
C:\Users\Admin\AppData\Roaming\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\mfpmp.exeC:\Users\Admin\AppData\Roaming\{0FD74F7C-EDE9-7677-34E4-8FB689BF85F9}\mfpmp.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTA5NDk2NjM1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x490 0x2c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:5404
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575fc6fd984687a3b60604f8385d2d3ee
SHA147ca2cd71dfbddaf9fbdec9f9b4940d465bd40e9
SHA2567f3c92d21167647ec0b45c9ed1163abd9a8d9199bc1d715edd58440ea1adc6ab
SHA512cdeaa85deccb8ade6e361b47ee47a2fcf687f91e6105d2b250d6239eaefaaf40ce1f612dfcff132ade8bc497f9527429757ebf477092c8e10b16c6426971214a
-
Filesize
152B
MD5d93f6e4c57710d309e3397e058ad78f3
SHA10fbea33aed97992a22327797ad102e419b37e9cc
SHA2563439987ffec3d9feb7a8943beb481ee0259199882b66b863fe70c9f7ecbc21c3
SHA5122449fb3826e493fec6304cf48ccab992653be05799467c85f4327feb6446c4109057d08f57fd57a3c342ace8e3c74c887ce9a21112c25a8efbff7fe0ad5c757f
-
Filesize
6KB
MD5b2103fab1f60f1f86a29de97c1d82392
SHA12329356a1612cb249541a32ec71ac9bb7299ed5b
SHA256ef2657edc477c011802e7f1f8035da0bebf388be5ac955affde2ca16ffce34a9
SHA512790f570e315b046b2bde80b4cacb97d2ca9fc17f9fac6dffa60b6f1c4f648209ef9066664fa82c611e113ce41f3e3481deff2a46c875a1245a233e66c3e3f275
-
Filesize
6KB
MD5691f9ad38db6af7660e6616957b3ff87
SHA15f4887f8ad07f14e63d797d94df08ade81af9e6a
SHA256d37c74fa4128e9b07480bef19647dd060e67b9198c01466903fbcf8498874ec2
SHA512cca116c842a903a9711050336807d87705feb2d743b3c45b51679c3a689b71ad44918b0b4df4201b7fbbc68370c81c25758b41a18d63aeaea5407d7d560c9786
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5bbfbd647e30aec0fc1f529b98a424ca1
SHA14df1ba00d2b09274e7a6a00c78678af9fe39c035
SHA2563ff119db215cab11c6708cdde1e947bf24faae647506cacfb1b31ad0419b2558
SHA5123f30d0f4a5cb8001dbcd56996209dfcf3959a7cbefbd21b8e6118c5c49037a4c7126829364302bca245fd7c0198b35ea0a2d61651ed9777339a70dd6d1a88274
-
Filesize
1KB
MD514e5b06e8ecd5421ed419142c6092f12
SHA1523d039831911a226f3a4d61581aa1fa36ee4d02
SHA2568091ddb1bd55a37f5f8ec51c6893cabfa17015d2964aaf832c96ec3038fd3d51
SHA512ac918701ce5d51edda887eb9dcda8b5e08f6e5163e1c360bdba622e53bfd31611897175e4c580ad26b1d51940a8a2178aa7f7061248c765f7a4ae6ac57a3d860
-
Filesize
324KB
MD55610c73bff6be1ff1b14bdbdb14a6410
SHA1fc5bdaa888ba8c857e2280116a4482fd9c77e014
SHA2563c2915bbfd7e823453154b03f751f44dacc651436fdb37f4d44d828124a8675c
SHA512c1098c740e83c39a3e6ca031921ed1236d15491c1d84a66c6c095f646141849068f7f1e1e65590665b09454cfdbf404fa1657e6926489c624ac377baee7ed183
-
Filesize
88B
MD592c610887fb6746fa6c904f4a1ea5afe
SHA16a4eecf0a152668a4e81adc3aa12eb7b7bdb25cf
SHA2560361de0c3c54ef9f7100d5ef6044e380ccb08d6b1464fd283a47d80bf9828b0c
SHA51251a6e0a6e3512a09cb47c2ea1e280f17f671703d5ad5025e878d2c4ce41d81b4df9415d65673e761e6d46af9f676532dc03d214a1f20ef8116333ecae389e258
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c
-
Filesize
19KB
MD5df9b96577203a6533d5daee99dab735b
SHA145364b9987314afdaca04fa85f1caff8a549b164
SHA2565fd7470895439b491fcada13f1feb67ff505616b4492a75d46bc3b0680014a4a
SHA51223d09a371ae66582c4608a3f6c2cf29bfd7108f73bf5cef5294f8650901207f8aa011027c5a6be6fc4a50d52ec1cf0f459042a6ec0677ea05d3bb1fadb99d372
-
Filesize
10KB
MD5900019f06f79355b40b8af428ac68a5f
SHA11e8aede2a825d9cf934c7c73239a4148d0c80bf0
SHA2561d3213e20db6e45780917e1372b54261b3366b585a597feb3371d18f088d279d
SHA512657a7e076b3ff57f7e77b51a8824c57975ef88dd47590f9e7add74701452a4bdd64b56fa195fc6afc2dfa687838c249c02ea2c444266a119c671e2d23ef16211