Analysis

  • max time kernel
    29s
  • max time network
    5s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 21:38

General

  • Target

    Frog Spoofer.exe

  • Size

    2.7MB

  • MD5

    e001605fa695282a2d3170d8d9e956c9

  • SHA1

    4544155daae0335ada1d05a509e43b8c0434ffc8

  • SHA256

    003dc05c74dedfb83f73982173d2ed293a84a2af8a7ef8b6e6ff928119859a2e

  • SHA512

    11642791791255eea62db5b5058e651329d9b537cc9ffd734702b5bf5207351ecc3bbdb3499acb3dc43e7937da8efd9e23b1e1ccfaa6a077bd747a40926d40d6

  • SSDEEP

    49152:wy8J1anDS2TFQTnQT2QT9QT1QTXCbAAKrqgvWAtY3o41MBXcOz5dD:CxYw1aCkX23o41MBXc4D

Malware Config

Signatures

  • Cerber 10 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 20 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 34 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Frog Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Frog Spoofer.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerUI.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerSvc.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4048
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\system32\sc.exe
        sc stop HTTPDebuggerPro
        3⤵
        • Launches sc.exe
        PID:4556
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2468
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Windows\system32\sc.exe
        sc stop HTTPDebuggerPro
        3⤵
        • Launches sc.exe
        PID:2248
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Windows\system32\sc.exe
        sc stop KProcessHacker3
        3⤵
        • Launches sc.exe
        PID:1636
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\system32\sc.exe
        sc stop KProcessHacker2
        3⤵
        • Launches sc.exe
        PID:3276
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Windows\system32\sc.exe
        sc stop KProcessHacker1
        3⤵
        • Launches sc.exe
        PID:4768
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Windows\system32\sc.exe
        sc stop wireshark
        3⤵
        • Launches sc.exe
        PID:2476
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop cpuz150 >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\system32\sc.exe
        sc stop cpuz150
        3⤵
        • Launches sc.exe
        PID:1224
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop vgt >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Windows\system32\sc.exe
        sc stop vgt
        3⤵
        • Launches sc.exe
        PID:2840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop vgrl >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\system32\sc.exe
        sc stop vgrl
        3⤵
        • Launches sc.exe
        PID:3988
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop vgk >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\system32\sc.exe
        sc stop vgk
        3⤵
        • Launches sc.exe
        PID:1828
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop vgc >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\system32\sc.exe
        sc stop vgc
        3⤵
        • Launches sc.exe
        PID:4752
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc delete vgrl >nul 2>&1
      2⤵
        PID:4996
        • C:\Windows\system32\sc.exe
          sc delete vgrl
          3⤵
          • Launches sc.exe
          PID:4564
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c sc delete vgk >nul 2>&1
        2⤵
          PID:4872
          • C:\Windows\system32\sc.exe
            sc delete vgk
            3⤵
            • Launches sc.exe
            PID:1108
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c sc delete vgc >nul 2>&1
          2⤵
            PID:3788
            • C:\Windows\system32\sc.exe
              sc delete vgc
              3⤵
              • Launches sc.exe
              PID:1508
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc delete vg >nul 2>&1
            2⤵
              PID:1188
              • C:\Windows\system32\sc.exe
                sc delete vg
                3⤵
                • Launches sc.exe
                PID:4412
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill / f / im vgtray.exe >nul 2>&1
              2⤵
                PID:3528
                • C:\Windows\system32\taskkill.exe
                  taskkill / f / im vgtray.exe
                  3⤵
                  • Kills process with taskkill
                  PID:244
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c sc delete cpuz150 >nul 2>&1
                2⤵
                  PID:4572
                  • C:\Windows\system32\sc.exe
                    sc delete cpuz150
                    3⤵
                    • Launches sc.exe
                    PID:4660
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c sc config wuauserv start = disabled >nul 2>&1
                  2⤵
                    PID:1908
                    • C:\Windows\system32\sc.exe
                      sc config wuauserv start = disabled
                      3⤵
                      • Launches sc.exe
                      PID:3328
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c net stop wuauserv >nul 2>&1
                    2⤵
                      PID:4372
                      • C:\Windows\system32\net.exe
                        net stop wuauserv
                        3⤵
                          PID:524
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop wuauserv
                            4⤵
                              PID:1472
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c sc config bits start = disabled >nul 2>&1
                          2⤵
                            PID:1716
                            • C:\Windows\system32\sc.exe
                              sc config bits start = disabled
                              3⤵
                              • Launches sc.exe
                              PID:2508
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c net stop bits >nul 2>&1
                            2⤵
                              PID:3168
                              • C:\Windows\system32\net.exe
                                net stop bits
                                3⤵
                                  PID:4480
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop bits
                                    4⤵
                                      PID:2472
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c sc config dosvc start = disabled >nul 2>&1
                                  2⤵
                                    PID:1692
                                    • C:\Windows\system32\sc.exe
                                      sc config dosvc start = disabled
                                      3⤵
                                      • Launches sc.exe
                                      PID:1812
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c net stop dosvc >nul 2>&1
                                    2⤵
                                      PID:3192
                                      • C:\Windows\system32\net.exe
                                        net stop dosvc
                                        3⤵
                                          PID:5116
                                          • C:\Windows\system32\net1.exe
                                            C:\Windows\system32\net1 stop dosvc
                                            4⤵
                                              PID:1516
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c sc config UsoSvc start = disabled >nul 2>&1
                                          2⤵
                                            PID:3216
                                            • C:\Windows\system32\sc.exe
                                              sc config UsoSvc start = disabled
                                              3⤵
                                              • Launches sc.exe
                                              PID:2768
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c net stop UsoSvc >nul 2>&1
                                            2⤵
                                              PID:404
                                              • C:\Windows\system32\net.exe
                                                net stop UsoSvc
                                                3⤵
                                                  PID:3680
                                                  • C:\Windows\system32\net1.exe
                                                    C:\Windows\system32\net1 stop UsoSvc
                                                    4⤵
                                                      PID:1740
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c taskkill / f / im smartscreen.exe
                                                  2⤵
                                                    PID:4576
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill / f / im smartscreen.exe
                                                      3⤵
                                                      • Kills process with taskkill
                                                      PID:1884
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c taskkill / f / im EasyAntiCheat.exe
                                                    2⤵
                                                      PID:2104
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill / f / im EasyAntiCheat.exe
                                                        3⤵
                                                        • Kills process with taskkill
                                                        PID:2960
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c taskkill / f / im dnf.exe
                                                      2⤵
                                                        PID:5048
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill / f / im dnf.exe
                                                          3⤵
                                                          • Kills process with taskkill
                                                          PID:1952
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c taskkill / f / im DNF.exe
                                                        2⤵
                                                          PID:760
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill / f / im DNF.exe
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:3624
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c taskkill / f / im CrossProxy.exe
                                                          2⤵
                                                            PID:4824
                                                            • C:\Windows\system32\taskkill.exe
                                                              taskkill / f / im CrossProxy.exe
                                                              3⤵
                                                              • Kills process with taskkill
                                                              PID:4700
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c taskkill / f / im tensafe_1.exe
                                                            2⤵
                                                              PID:4968
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill / f / im tensafe_1.exe
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:4320
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c taskkill / f / im TenSafe_1.exe
                                                              2⤵
                                                                PID:1256
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill / f / im TenSafe_1.exe
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  PID:4760
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c taskkill / f / im tensafe_2.exe
                                                                2⤵
                                                                  PID:4092
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill / f / im tensafe_2.exe
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    PID:3420
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c taskkill / f / im tencentdl.exe
                                                                  2⤵
                                                                    PID:3572
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill / f / im tencentdl.exe
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      PID:4976
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c taskkill / f / im TenioDL.exe
                                                                    2⤵
                                                                      PID:3648
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill / f / im TenioDL.exe
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        PID:3272
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c taskkill / f / im uishell.exe
                                                                      2⤵
                                                                        PID:1536
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill / f / im uishell.exe
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          PID:3932
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c taskkill / f / im BackgroundDownloader.exe
                                                                        2⤵
                                                                          PID:2384
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill / f / im BackgroundDownloader.exe
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:3400
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c taskkill / f / im conime.exe
                                                                          2⤵
                                                                            PID:3444
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill / f / im conime.exe
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:3276
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c taskkill / f / im QQDL.EXE
                                                                            2⤵
                                                                              PID:3188
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill / f / im QQDL.EXE
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:2424
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c taskkill / f / im qqlogin.exe
                                                                              2⤵
                                                                                PID:1840
                                                                                • C:\Windows\system32\taskkill.exe
                                                                                  taskkill / f / im qqlogin.exe
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:4188
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c taskkill / f / im dnfchina.exe >nul 2>&1
                                                                                2⤵
                                                                                  PID:4672
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill / f / im dnfchina.exe
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:2264
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c taskkill / f / im dnfchinatest.exe
                                                                                  2⤵
                                                                                    PID:2840
                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                      taskkill / f / im dnfchinatest.exe
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:3204
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c taskkill / f / im dnf.exe
                                                                                    2⤵
                                                                                      PID:2188
                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                        taskkill / f / im dnf.exe
                                                                                        3⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:2932
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c taskkill / f / im txplatform.exe
                                                                                      2⤵
                                                                                        PID:912
                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                          taskkill / f / im txplatform.exe
                                                                                          3⤵
                                                                                          • Kills process with taskkill
                                                                                          PID:3812
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c taskkill / f / im TXPlatform.exe
                                                                                        2⤵
                                                                                          PID:2752
                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                            taskkill / f / im TXPlatform.exe
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            PID:4296
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c taskkill / f / im OriginWebHelperService.exe
                                                                                          2⤵
                                                                                            PID:2592
                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                              taskkill / f / im OriginWebHelperService.exe
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:1108
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c taskkill / f / im Origin.exe
                                                                                            2⤵
                                                                                              PID:4872
                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                taskkill / f / im Origin.exe
                                                                                                3⤵
                                                                                                • Kills process with taskkill
                                                                                                PID:1508
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c taskkill / f / im OriginClientService.exe
                                                                                              2⤵
                                                                                                PID:3788
                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                  taskkill / f / im OriginClientService.exe
                                                                                                  3⤵
                                                                                                  • Kills process with taskkill
                                                                                                  PID:4912
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c taskkill / f / im OriginER.exe
                                                                                                2⤵
                                                                                                  PID:2896
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill / f / im OriginER.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:3724
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c taskkill / f / im OriginThinSetupInternal.exe
                                                                                                  2⤵
                                                                                                    PID:5064
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      taskkill / f / im OriginThinSetupInternal.exe
                                                                                                      3⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:1892
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c taskkill / f / im OriginLegacyCLI.exe
                                                                                                    2⤵
                                                                                                      PID:4376
                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                        taskkill / f / im OriginLegacyCLI.exe
                                                                                                        3⤵
                                                                                                        • Kills process with taskkill
                                                                                                        PID:208
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c taskkill / f / im Agent.exe
                                                                                                      2⤵
                                                                                                        PID:4080
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          taskkill / f / im Agent.exe
                                                                                                          3⤵
                                                                                                          • Kills process with taskkill
                                                                                                          PID:4104
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c taskkill / f / im Client.exe
                                                                                                        2⤵
                                                                                                          PID:3860
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            taskkill / f / im Client.exe
                                                                                                            3⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:116
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll /accepteula
                                                                                                          2⤵
                                                                                                            PID:4988
                                                                                                            • C:\Windows\System32\accessibility.dll
                                                                                                              C:\Windows\System32\accessibility.dll /accepteula
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4860
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll
                                                                                                            2⤵
                                                                                                              PID:1812
                                                                                                              • C:\Windows\System32\accessibility.dll
                                                                                                                C:\Windows\System32\accessibility.dll
                                                                                                                3⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:5108
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll /accepteula
                                                                                                              2⤵
                                                                                                                PID:1592
                                                                                                                • C:\Windows\System32\accessibility.dll
                                                                                                                  C:\Windows\System32\accessibility.dll /accepteula
                                                                                                                  3⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:3004
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll C: %random:~-1%%random:~-1%%random:~-1%%random:~-1%-%random:~-1%%random:~-1%%random:~-1%%random:~-1%
                                                                                                                2⤵
                                                                                                                  PID:2128
                                                                                                                  • C:\Windows\System32\accessibility.dll
                                                                                                                    C:\Windows\System32\accessibility.dll C: 9652-8085
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:2132
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll D: %random:~-1%%random:~-1%%random:~-1%%random:~-1%-%random:~-1%%random:~-1%%random:~-1%%random:~-1%
                                                                                                                  2⤵
                                                                                                                    PID:3064
                                                                                                                    • C:\Windows\System32\accessibility.dll
                                                                                                                      C:\Windows\System32\accessibility.dll D: 3425-3708
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:3376
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll E: %random:~-1%%random:~-1%%random:~-1%%random:~-1%-%random:~-1%%random:~-1%%random:~-1%%random:~-1%
                                                                                                                    2⤵
                                                                                                                      PID:4700
                                                                                                                      • C:\Windows\System32\accessibility.dll
                                                                                                                        C:\Windows\System32\accessibility.dll E: 6561-7430
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:3088
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll F: %random:~-1%%random:~-1%%random:~-1%%random:~-1%-%random:~-1%%random:~-1%%random:~-1%%random:~-1%
                                                                                                                      2⤵
                                                                                                                        PID:1392
                                                                                                                        • C:\Windows\System32\accessibility.dll
                                                                                                                          C:\Windows\System32\accessibility.dll F: 9326-4053
                                                                                                                          3⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:2572
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll G: %random:~-1%%random:~-1%%random:~-1%%random:~-1%-%random:~-1%%random:~-1%%random:~-1%%random:~-1%
                                                                                                                        2⤵
                                                                                                                          PID:4444
                                                                                                                          • C:\Windows\System32\accessibility.dll
                                                                                                                            C:\Windows\System32\accessibility.dll G: 2181-9776
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:3932
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\accessibility.dll
                                                                                                                          2⤵
                                                                                                                            PID:5072
                                                                                                                            • C:\Windows\System32\accessibility.dll
                                                                                                                              C:\Windows\System32\accessibility.dll
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:3304
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /SS %random%%random%%random%
                                                                                                                            2⤵
                                                                                                                              PID:3300
                                                                                                                              • C:\Windows\System32\ifsutipx.exe
                                                                                                                                C:\Windows\System32\ifsutipx.exe /SS 22929103704528
                                                                                                                                3⤵
                                                                                                                                • Cerber
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:4948
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /BS %random%%random%%random%
                                                                                                                              2⤵
                                                                                                                                PID:4180
                                                                                                                                • C:\Windows\System32\ifsutipx.exe
                                                                                                                                  C:\Windows\System32\ifsutipx.exe /BS 229322111922393
                                                                                                                                  3⤵
                                                                                                                                  • Cerber
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:972
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /SU auto
                                                                                                                                2⤵
                                                                                                                                  PID:3812
                                                                                                                                  • C:\Windows\System32\ifsutipx.exe
                                                                                                                                    C:\Windows\System32\ifsutipx.exe /SU auto
                                                                                                                                    3⤵
                                                                                                                                    • Cerber
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:4868
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /IV %random:~-1%.%random:~-1%.%random:~-1%
                                                                                                                                  2⤵
                                                                                                                                    PID:2504
                                                                                                                                    • C:\Windows\System32\ifsutipx.exe
                                                                                                                                      C:\Windows\System32\ifsutipx.exe /IV 9.7.3
                                                                                                                                      3⤵
                                                                                                                                      • Cerber
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:1652
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /ID 0%random:~-1%/0%random:~-1%/2021
                                                                                                                                    2⤵
                                                                                                                                      PID:4912
                                                                                                                                      • C:\Windows\System32\ifsutipx.exe
                                                                                                                                        C:\Windows\System32\ifsutipx.exe /ID 02/06/2021
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:2344
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /SP MS-%random:~-1%C%random:~-1%%random:~-1%F
                                                                                                                                      2⤵
                                                                                                                                        PID:5064
                                                                                                                                        • C:\Windows\System32\ifsutipx.exe
                                                                                                                                          C:\Windows\System32\ifsutipx.exe /SP MS-5C43F
                                                                                                                                          3⤵
                                                                                                                                          • Cerber
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:4908
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /SK A%random:~-1%%random:~-1%%random:~-1%S%random:~-1%%random:~-1%%random:~-1%O%random:~-1%
                                                                                                                                        2⤵
                                                                                                                                          PID:1200
                                                                                                                                          • C:\Windows\System32\ifsutipx.exe
                                                                                                                                            C:\Windows\System32\ifsutipx.exe /SK A950S093O9
                                                                                                                                            3⤵
                                                                                                                                            • Cerber
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:524
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /SF B%random:~-1%%random:~-1%%random:~-1%S%random:~-1%%random:~-1%%random:~-1%Z%random:~-1%
                                                                                                                                          2⤵
                                                                                                                                            PID:2292
                                                                                                                                            • C:\Windows\System32\ifsutipx.exe
                                                                                                                                              C:\Windows\System32\ifsutipx.exe /SF B234S362Z1
                                                                                                                                              3⤵
                                                                                                                                              • Cerber
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:2192
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\Windows\System32\ifsutipx.exe /BT X%random:~-1%%random:~-1%%random:~-1%S%random:~-1%%random:~-1%%random:~-1%X%random:~-1%
                                                                                                                                            2⤵
                                                                                                                                              PID:2032
                                                                                                                                              • C:\Windows\System32\ifsutipx.exe
                                                                                                                                                C:\Windows\System32\ifsutipx.exe /BT X520S809X4
                                                                                                                                                3⤵
                                                                                                                                                • Cerber
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                PID:3780

                                                                                                                                          Network

                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\Windows\System32\accessibility.dll

                                                                                                                                            Filesize

                                                                                                                                            165KB

                                                                                                                                            MD5

                                                                                                                                            42b7d0cdd6a7ce9791b11d69315523dc

                                                                                                                                            SHA1

                                                                                                                                            8de659e46ea55b5ab3eb32b8216f74fe53f7d0a2

                                                                                                                                            SHA256

                                                                                                                                            5b85d64218283c933ca9afd194d5b8f451a519dcec58369434009d0dbd04e9e1

                                                                                                                                            SHA512

                                                                                                                                            f5141adbf226f15128e553088b2625f2cb38a1fbf3cff98dda205e1686ce186537abf5daa7c7148f887ab3bafcf03a9fa487844cad95e77ae38eae5d00af41cf

                                                                                                                                          • C:\Windows\System32\amifldrv64.sys

                                                                                                                                            Filesize

                                                                                                                                            29KB

                                                                                                                                            MD5

                                                                                                                                            f22740ba54a400fd2be7690bb204aa08

                                                                                                                                            SHA1

                                                                                                                                            5812387783d61c6ab5702213bb968590a18065e3

                                                                                                                                            SHA256

                                                                                                                                            65c26276cadda7a36f8977d1d01120edb5c3418be2317d501761092d5f9916c9

                                                                                                                                            SHA512

                                                                                                                                            ac1f89736cf348f634b526569b5783118a1a35324f9ce2f2804001e5a04751f8cc21d09bfa1c4803cd14a64152beba868f5ecf119f10fa3ccbe680d2fb481500

                                                                                                                                          • C:\Windows\System32\ifsutipx.exe

                                                                                                                                            Filesize

                                                                                                                                            459KB

                                                                                                                                            MD5

                                                                                                                                            92a410010d0fb650385e88c1474ac29d

                                                                                                                                            SHA1

                                                                                                                                            7ab69e5c7442a94fb5fa25705ca4eb2028a0c32c

                                                                                                                                            SHA256

                                                                                                                                            47d8117f0f7ecdc6843fe7f33cfa8a4a12bcf657fe648bde19050a12950e9555

                                                                                                                                            SHA512

                                                                                                                                            ff698acfef1270daebf5c4788e414ced15fd724c61e45a9cfa5f9220aa70866e43d0cb3348f06cd2741a13c2e5e42ae49eaf266263ab2777378244d4d7d1131e