Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/03/2025, 00:07
250323-aejphstxdx 823/03/2025, 00:06
250323-adrzhaxqz8 823/03/2025, 00:05
250323-adkkestxbw 323/03/2025, 00:02
250323-abxrzaxqw9 1020/03/2025, 23:27
250320-3fd5mstrw6 1001/03/2025, 19:51
250301-ykw4sszqy9 801/03/2025, 19:50
250301-yj8ffazqx8 801/03/2025, 19:47
250301-yh1dfazxev 801/03/2025, 19:45
250301-yghr1azp15 1026/02/2025, 02:07
250226-ckdrka1m15 10Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/03/2025, 23:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win11-20250314-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\_R_E_A_D___T_H_I_S___KRPN2C8E_.txt
cerber
http://xpcx6erilkjced3j.onion/0143-EC4B-AFFE-0098-BB59
http://xpcx6erilkjced3j.1n5mod.top/0143-EC4B-AFFE-0098-BB59
http://xpcx6erilkjced3j.19kdeh.top/0143-EC4B-AFFE-0098-BB59
http://xpcx6erilkjced3j.1mpsnr.top/0143-EC4B-AFFE-0098-BB59
http://xpcx6erilkjced3j.18ey8e.top/0143-EC4B-AFFE-0098-BB59
http://xpcx6erilkjced3j.17gcun.top/0143-EC4B-AFFE-0098-BB59
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1105) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file 1 IoCs
flow pid Process 86 5172 msedge.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4640 netsh.exe 2008 netsh.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Cerber5.exe -
Executes dropped EXE 2 IoCs
pid Process 1052 Cerber5.exe 3992 Cerber5.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 85 raw.githubusercontent.com 86 raw.githubusercontent.com 84 raw.githubusercontent.com -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cerber5.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp845E.bmp" Cerber5.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\bitcoin Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\office Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook Cerber5.exe File opened for modification \??\c:\program files (x86)\steam Cerber5.exe File opened for modification \??\c:\program files\ Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\word Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\outlook Cerber5.exe File opened for modification \??\c:\program files (x86)\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\the bat! Cerber5.exe File opened for modification \??\c:\program files (x86)\thunderbird Cerber5.exe File opened for modification \??\c:\program files (x86)\word Cerber5.exe File opened for modification \??\c:\program files (x86)\office Cerber5.exe File opened for modification \??\c:\program files (x86)\ Cerber5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1791486240\manifest.fingerprint msedge.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1791486240\sets.json msedge.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1793473119\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1041392460\manifest.fingerprint msedge.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1041392460\manifest.json msedge.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1791486240\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1791486240\manifest.json msedge.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1791486240\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1041392460\typosquatting_list.pb msedge.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Cerber5.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5364_1793473119\data.txt msedge.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\ Cerber5.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\Cerber5.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3288 cmd.exe 6060 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 6140 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869868377881267" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{6E4606E2-C16F-48BC-877B-E9C1006BB899} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings Cerber5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Cerber5.exe:Zone.Identifier msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 404 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6060 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6052 msedge.exe 6052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1052 Cerber5.exe Token: SeCreatePagefilePrivilege 1052 Cerber5.exe Token: SeDebugPrivilege 6140 taskkill.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5364 wrote to memory of 5376 5364 msedge.exe 78 PID 5364 wrote to memory of 5376 5364 msedge.exe 78 PID 5364 wrote to memory of 5172 5364 msedge.exe 79 PID 5364 wrote to memory of 5172 5364 msedge.exe 79 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 1820 5364 msedge.exe 80 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81 PID 5364 wrote to memory of 5916 5364 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x264,0x7ffdb138f208,0x7ffdb138f214,0x7ffdb138f2202⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1860,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:112⤵
- Downloads MZ/PE file
PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2212,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:132⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3456,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:142⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5136,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:142⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5156,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:142⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:142⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5932,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:142⤵PID:2044
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11403⤵PID:2288
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:142⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:142⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4240,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:142⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:142⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6356,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6464 /prefetch:142⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5540,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=568 /prefetch:142⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6372,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6316,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6668 /prefetch:142⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6780,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6836 /prefetch:142⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4920,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6764 /prefetch:142⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2028,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5408 /prefetch:142⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6240,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=5668 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=764,i,17380671728482892747,4048897109247630923,262144 --variations-seed-version --mojo-platform-channel-handle=6996 /prefetch:142⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1104
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___73E4_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:5932
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___9COE6R_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "C"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6140
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6060
-
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8d70cc0d-2ca7-44c2-a4ca-b225f5e4cbed.tmp
Filesize37KB
MD5bb1f48d2c7c174933ad8a28bdab50d42
SHA1fd3f632bfc717a68d175a27b61daf921155141d3
SHA25622cd3db6a24b5654ea62b5842c84eb39f9345fef066f31e5e28404ca10af014b
SHA5122cf6d5b4bacfcd13a02c41834d1054b49a28585bfc2b5c8218a7a061a7a0c735c175538b0278a7adbc3d5250bb7a2977c7e8439269d7ab48650c44badfbd6ebf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD524996f8a8d7fb188f6636141f440ad20
SHA18951a6ebc9065746f6c0fba640cd7ad872c7aef7
SHA2565f5352bc5f97ab480cf853018edb54aaf88e7c723db3c4481e0a21492912af46
SHA512f0bc9346b2ca22e852952597e342afca567e966e1d2cb992079d5856d12a0f7ee072a87321c38d1a4733503557bd8084df0779617c296f968a0f8aa2a47e23c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5cbcbbade31c5f8a1b6bcab5068efb75e
SHA14d1db5a8f9d85e82ef7ca1bbbbed0d3fb23c5ef4
SHA256678a64526577507ef70a238eeb854fd9a04fa3f20d93a041c5e4f2d79bd1b750
SHA51288eef85643c7db0c56b65f6d414b023ec17ea4ba61b32689e5ccc2fc7818fedef83b89b346cb8494ba88b470e6c4ad7f6fc36d8f5a683cba3981f545d76086d8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5fa50a22242b27a0402ac89f0af9c1e01
SHA13ebdec7f89bc1f5e2ea69564bd7115d089239a18
SHA256c6372ce0a7fcea8beec9ec0052b36dcd6792f515e4b7eca61f522809233ceb8f
SHA512903651f4b093cc2f7e0eba1b3c1a3f019ff30f17a5bda10db66a944ce44ba052671c56b0a1e3bec7f5fd252fdf3ce5c1fb9994c377740342a3c3374ec2c6f402
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c22b514c-e1b9-4095-a065-cd9b98a5d27b.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
412KB
MD5b95232d737ded562f9ec4c08b44f7f10
SHA1e1181eca6e990c6898a3e07c97e1a0898c26f9be
SHA25612ea752ba8197dce5782de89ccefc7de5ce25a4d7c728aa7b89c64ddf6a52c3c
SHA51223c5dc331e35940a3f57ba8754aec258efe8214d01722ebab300e82c008527af1635fde7393576a0933108eae1d900a7d6a9a5e7184e1ae02beaf9535f82028a
-
Filesize
411KB
MD5e283184b4ccc8159562f2d445898758b
SHA14b978add15fc7ce7242cffb8025c336b92644779
SHA256437793ee1ec66dbcc1bb379e6feafd79258467e2932bd8aa59fae21e30fd2a05
SHA512c746dff67df2a18260f36f164484993fa43b012958c4a2f52a81d97733f8f32e02c09b9f31d4fa027bcb272c739aa23a6a478c7c87ccdeda128ec3c086073531
-
Filesize
412KB
MD5af8e844adb621af3c31aa1ff225dceb8
SHA108d499fea3635daa276f24bfd661baaffd09e8fc
SHA25605414697a935cb987a49f3a59eae7353d91ecd2dd113b53026a9a8b3b27263fe
SHA51294d9b6db11648ef1925e66fec0b051970232cb9962a750157a363f439a983cd7c3c61b6a8608ebf03d2d0d56fe83fdd898734ba4d410dd133f782caae6c97e0e
-
Filesize
22KB
MD5d4d7d5e149dce9e89da064a792fb2662
SHA11dfab193315fdbb1b7f96bf72fd12949c72940f4
SHA2562cddb0ec9a1b3a350420f25cff6090ae755d63398c94d7be27e718bdfac89616
SHA51205868ed38a4a41051e07c9c08753e750f0e0723082adc71f75f1c8d65834cf3bbc4ebf1fc2c326c2f27e3918f5896af5b158b08c6ec2f53f09685337629b54ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\6e425417-3848-42bf-89ee-5c92e885fe37.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
469B
MD5bf526fb6c9474aa4b48d47a09f98fa92
SHA1ecfbadfe4465f9272b1eebea67f193264a1d43e6
SHA2569536b006163d2f7d439e1ad7e52cc8ad28d7e18acb6f4fee0336d7ab8e62e769
SHA512f7b22e78865da19a6535591ceaa4123b2ba2372e2606c3512c28e6fcaef73814f994ace639ed8945c3b01e46838c265426f62ecddd84fb019be268e5d379a05a
-
Filesize
22KB
MD5ee769d07bdf2faa146039f1b8ec93d77
SHA1570bcca9926f511c3db8b1b3e133d6775f4716f6
SHA256f6155f39a4d739c18120f006912fd90dc7affb4f93a55d619d5a044d585759cd
SHA51256254c1749d21ee6971d0c758c413e1bc6a5c8a3e73596938db64ecb639b435d48dcdcd665c8aadbd426d68860c3fe3d8154b351bf3a97ef377970149dfcd477
-
Filesize
904B
MD5f3d25561388bd77d7ff40104f517c04c
SHA1f375ca02910fcc6d7e3fb58ea43dd29fab3409ab
SHA256a64c38bb37bda9fae1aa3aa311b9d7c7744fafef286e5da7ce1bf4e1fad40796
SHA51250d8bc0c19522b163a6e3f7be7ccb3d2ebeddae6aab8b5edd308e01bcd40b1ccbfdc96af7193392a4ca7ca8c51ce8b83475d314a20650a153e217462136186c5
-
Filesize
50KB
MD5fda5a53bdeb1d52e86486875615e6600
SHA121a4c7ddd14f802d6e990234b595a93e3d32b94e
SHA2568e1e0baac5235a2fbb1a68f6c656e7d3ab9acfa0c6ea4a9724969fc2feca4134
SHA5129d340d56e2a65485d43ddd5a046f1f53eb357e71e819275217b47a921fd97724695cfedb7dcfbc3309370a3521b7aefe495ecb9a54e2a3ea792c08427954717d
-
Filesize
55KB
MD5bed9696c6fa6713cf5bafe04d99afffa
SHA1be8e520956102951523cf37b1f332cf0312a953c
SHA256744b5ce0a7acd3c7bf3dfaa30b0e3eb97e54e8de6a16de0b204993db8b8ce297
SHA5129c1a05cef849329db3f58e2feed8158639fe01d5ee1f1f87e6c23145029cc1f3e0f8a2600cbd68787d03207b19f57a0cd4c8cfcab9529b631040d317ba4fd964
-
Filesize
50KB
MD5ea54c377edf93e26207550e56713ea4e
SHA11f8a5b3493c71a5101d865835e2887af4e1c9b88
SHA2568a9ad16817328299a37afdd0a3933b400503fb35cf45008bf11559b67d9ebfac
SHA512931194050b4e6b308055995df8a3c184183bfdd671e16fd35889aa64e4cb942672d54d0b78483643a3d14e4cd144e2efef5473f040b76c0e16a5c9d4f6a11628
-
Filesize
50KB
MD5438318d4dc08d01ec766ba0d9988263b
SHA125d0918ada63b24702afd155b8c6809476c56b3c
SHA2563d1c8f4546926c25f08214279a5cf9c90f28353a159c722f7ab805d46804f697
SHA512faedd34105be6741bce2aedd401b0a50baf151b0043cbbcd41ef17c2b4b1bcffc7db5ca46fd5412ca2e519d7516a866ada4158f376d4d5001298c11e808f2fe1
-
Filesize
41KB
MD58ffedfa79fba2a55904377531e0fbbfa
SHA17d1844c99fbc8bfd1492acb80ab400263f05cd8c
SHA25662f96e6eb751eb084a6e7137ad57ddcb4bc9b031b95219ad86d837f783ba0e4d
SHA5126a56f34464f9f1fa260cae2341cad7bb0e65b739616766ae6d4e3978a0882ba5eb731dca430535fffd15fe9a51e4403988baef0656b24e49ddd3c02c2947ca71
-
Filesize
392B
MD598db9089de19a02cc6b9679e6ae2b7a8
SHA1c7b3f102398be2966a0bcf872bfe81901a11bb63
SHA256bee8a6ff0feec596ac73a689051d38e402cb0ad097b60a834096c25af83fed38
SHA512f58ad5a6d612dc63cf59e4a5d3ddbfec6179324f474c80e705bbd84a4abd75c407ab128d4b62d3edbe8656bc881886a3901213753d8c7f02f19d822952b53a9f
-
Filesize
392B
MD5a72a10c76d49047823df2a481659205d
SHA1cef15a7925aea9b52a6f05cc943da15a27f80980
SHA256096392af46f31c20c48c1348b511364895e37a013242c6946699c8702094f02f
SHA51239f48a4a59aed8b59770f69ba35296833defbf8791b2a073c4a6f77208eff4800a8c54f5866888d08ccc7b70d7ed7a6ef8a7bc383aa28a9c14329d26e5cb0d75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.20.1\typosquatting_list.pb
Filesize638KB
MD5da8609745ded15c07f9b3b42a794f1bf
SHA16f51794da7f06ce1e79ea3e42a22f67d068525bc
SHA2567dd01720dc53471b5cfb185a9b1e39be94a095c53e5dc8a295818e425ca265c6
SHA512a04bd2845bd6df19cd59eb6d62be863ceffca5841f8c878c289364418a89e4b0f1efa4224f3fb0d10a010ce73a23a60e81e6d7437ec27da3541f085e22ac938b
-
Filesize
1KB
MD55620bf92898a37ddfc633056c560d332
SHA1c4ddfc04691804948a5d95fd396e7538a051cf08
SHA25643c6d2e5d67979285c921cb86fcde957df43b1ad2e100779a0cfac19b1051aa9
SHA51215e6fb17d980635bffa63f5e62da97f3df16518bfc278293f381a90d808f85dc6e49301dc6af0eca7dd5254011b0d1d1ef6a1cd7bbc09e390a287084761c76c7
-
Filesize
75KB
MD58edd28f6fa9cfbf124a617f392ef82c8
SHA12fb6fca5b52c9e48dd9a8751b90c60dc7591a0f0
SHA25683fa7b8b5bc7452334d7355c641d565da53cce73498fd0f9a8154d86bd5b3ea9
SHA512889130200792e6fd8fdadda41e992d6921be868bd5aec272e007c975294607195593274201dd5153d3eb5d056f1556f708c4a74ac9f71bb0dba06f68bfbf97b1
-
Filesize
313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
118B
MD5395a738237cb5606743da99d5459bd59
SHA153a2e376dbba8020189b4d629d1ce452c43abc42
SHA2566a15b2c0969575a4ae419e8b0eedc7c5515c8ae3dd73771e431e484689684aac
SHA5120ac1112218d23328eb3cccf777c9bf7b0c31b71387fc620d0f91fec73994661021524ae66d8b81f26d1d7f4df8ac60c12f7852c72c65030d0c106a0ba773a8bb
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1