Analysis
-
max time kernel
899s -
max time network
832s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
deception-rules (11).csv
Resource
win10v2004-20250314-en
General
-
Target
deception-rules (11).csv
-
Size
8KB
-
MD5
10fd331f3c4fd86806f8e32c38e912b6
-
SHA1
85de90ff6468df5b1e3a701af4aa32bc3e6fc387
-
SHA256
e53d33dac3813096d6630fd1b3af960e4d7264ffbce5d85d31783c36489d27cd
-
SHA512
9bbfaf13263c8eea5b6950962568d59dbdb82e025e552432ceabc67d0d050437111b4a8d93d76244e5abe0e1dd1c85a0cfb34e5462e3256259a261fede19b1ed
-
SSDEEP
192:Pz9wf2TEKKaVO+HpCpdHAAYoeytnTHznv4hDX:GNankcgQL
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___A4H6_.txt
cerber
http://p27dokhpz2n7nvgr.onion/FECC-DE04-4AF3-0446-903E
http://p27dokhpz2n7nvgr.12hygy.top/FECC-DE04-4AF3-0446-903E
http://p27dokhpz2n7nvgr.14ewqv.top/FECC-DE04-4AF3-0446-903E
http://p27dokhpz2n7nvgr.14vvrc.top/FECC-DE04-4AF3-0446-903E
http://p27dokhpz2n7nvgr.129p1t.top/FECC-DE04-4AF3-0446-903E
http://p27dokhpz2n7nvgr.1apgrn.top/FECC-DE04-4AF3-0446-903E
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___R7PMH_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1132) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 5612 netsh.exe 3388 netsh.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cerber.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 113 raw.githubusercontent.com 114 raw.githubusercontent.com 157 raw.githubusercontent.com -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC0C.bmp" cerber.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\office cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote cerber.exe File opened for modification \??\c:\program files (x86)\the bat! cerber.exe File opened for modification \??\c:\program files (x86)\word cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\word cerber.exe File opened for modification \??\c:\program files (x86)\onenote cerber.exe File opened for modification \??\c:\program files\ cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook cerber.exe File opened for modification \??\c:\program files (x86)\office cerber.exe File opened for modification \??\c:\program files (x86)\outlook cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird cerber.exe File opened for modification \??\c:\program files (x86)\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\steam cerber.exe File opened for modification \??\c:\program files (x86)\ cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server cerber.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\ cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook cerber.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cerber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1672 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Kills process with taskkill 1 IoCs
pid Process 3992 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133886915232375933" chrome.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings cerber.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\DisplayName = "Chrome Sandbox" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Moniker = "cr.sb.odm3E4D1A088C1F6D498C84F3C86DE73CE49F82A104" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 220 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1672 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5464 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 5688 chrome.exe 5688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE 5464 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 5992 1684 chrome.exe 101 PID 1684 wrote to memory of 5992 1684 chrome.exe 101 PID 1684 wrote to memory of 4212 1684 chrome.exe 102 PID 1684 wrote to memory of 4212 1684 chrome.exe 102 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 3296 1684 chrome.exe 103 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104 PID 1684 wrote to memory of 5776 1684 chrome.exe 104
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\deception-rules (11).csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffede7bdcf8,0x7ffede7bdd04,0x7ffede7bdd102⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1640,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2224 /prefetch:32⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2112,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2420,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:5776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4312,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4328 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4744,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5384,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5392,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5640,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5772,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5896,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5636,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5624,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3544,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3480,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3532 /prefetch:82⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3264,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5656,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3300 /prefetch:82⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4448,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4648 /prefetch:22⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5984,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5592,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3732,i,9717300804335317945,6125459618574744611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4256
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3944
-
C:\Users\Admin\Downloads\Ransomware.Cerber\cerber.exe"C:\Users\Admin\Downloads\Ransomware.Cerber\cerber.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5292 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___71B5ZF_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___GK95_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cerber.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3992
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5c1620e4195482711b4644522058b5174
SHA1c3d04233e2e90ff2a01668863fbc04092998d122
SHA256e9642b344bfa12e528694142aee8fa414e6fa7fbfdf0f342c2ccda7e159d24a9
SHA5127a441582f405600b5680e2f1e3379ae591b5bd40e066a3a261d2457bba3fffe77d67e0b2eb01ea847119c7b65d9140133e18cab54c8dee893dc0e78e5f871c42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\363fa5e3-18bf-44b2-b39b-570700192b26.tmp
Filesize12KB
MD5d708d9befcc77ab14bdb0ea483d9841a
SHA146cd43013e9d42ccefe4d00527b92a4e8bd081cf
SHA2564deffd31a7bd62b3a68c4233d790877ccb1c0eb0a7734c58cc8f3cfd7e39cede
SHA512cb691c79e773b58e0edd95080d6852ab559b02d65e26220b37b514e208592e2f2bab575368860ece6199d0b45c56856aae87fdca8667571839206755111c3f4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8b662302-55e7-4665-8263-f578e8bb00d0.tmp
Filesize12KB
MD592f83e38b850ce1f775394ff4414f568
SHA16b77fbc7a2aeb67b933f20fcc8929f82963c1c37
SHA25699d3abac8e62f5ce25ed19e6c9ac4ae05ef7b5d8ec0bb15ba06eeb756234544d
SHA5129e7f8b71ee02315a14938f57e9b9fa795009c93c459e5a6a876624a84648952450fa51d3720d62553e1c16d5862686f8f0dd3f2bbd8c7d00af6219b95ce45745
-
Filesize
649B
MD50b9e60a10d5dbbb4ac0cf6d352c2ced2
SHA1639a3f0cb61722e12fbd494a131cb71fdcef534c
SHA2567f4d90bdd9ce983a57a050bc9a03b10e39ac7f4df0fcb425ef80bd71af581fd6
SHA512ec77cb314bf47788b2f724f980b588ae2819891d267dd9108901b2a3c991ff9b2bc80c4c97dffd5ca3150608498da875da14ba6db5f6e04a8a564f9d265a8b3d
-
Filesize
2KB
MD5190062a1b3fdc18c6108ba886772488e
SHA13706ce341b510fd5f6978c9f5bedd2ae23f9da82
SHA2565da04eb9b55f429fb210a295ae5db38337c811822cf6b2b27b08aafdab1ff949
SHA51233a8bcc05cf3915fcdedde5a0c10ee11cf20ec08f037bb531e11278c5e5df87c1e75dfc05316f1ad97396fd4efefea9433d22e86da87bd979beaddf78572a544
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
5KB
MD52ec257ab0f737f9f8fbbe2474405d48d
SHA158f65ce4fa57156611568ea89f16ee3320861dc4
SHA2565270e759b2766455d904ccd01613caec8620659a4834d3d3a95bab6035c14625
SHA512b539b87e2fd6b7ed264ab810de3c24472bdc92fe6dbc6f7f70a1a8b5d11641297498b8e82306b6f4701351f237846b0848ed770241812fd9b2af7a49d33b6d41
-
Filesize
5KB
MD542e5a39b247aa750d74bf5e262370984
SHA1ecba1ddf670c63ab4bd9f68520d618ca53254fbe
SHA256218b7c8c08d3181e28e76b9eff18911454368bb3e320e7119b880f79fb95c92d
SHA51200fb4546528564a799be22e499ead5a1f28c7ffd438e02aa2f50ead9a1db177f36de3b34d29c5631549180d551187a4be3f8a14e93c7031aca640f8ec59468a4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5c2d640b7dbdff983c4af2f05c7976b32
SHA1e05c1324f1e0f57cb98358897d7a52b075e4745b
SHA2566dd11d5a9fa69195b53541c0ad5b86f63e60a6d5d90701de1c8ffc1a3a53f13d
SHA5126c4fd5ecddcf8ea08241b64544a9ce418063b1bd2e69fcdf85b97df68c99c07ddf40c78feb4a7d991cfe7ece77d13da6e282ddf4db21153879ac7d85399176fb
-
Filesize
12KB
MD5f980a029a4bd653bf53987c597fd72f5
SHA1f2b2729f5135faa0fb6fbc39279f6fd3f7d2d313
SHA25607622a0a35f6864913a08b0093b6f891aa47ca6e6e71533181cf4859740a41f7
SHA512056d28321be869ee455dec160afafee8c725d7b802f021f278e82e51f9e26f15c272f3105b18b9a5f9731ca45d8a099db0fe6c162ce8a58ca08a2fe9b73e2222
-
Filesize
11KB
MD5771ffb0b7ed01debc3568553e94dd106
SHA1e85f19fc533e86babd3aabe926bde9d3818cf890
SHA2565a652999b248fa32fb0c99e65886238c9fa7140c96edacd3891100ce9c1602e4
SHA5125728619b185b4fbb15ebdabd5c459241ccce8a74de50e255c91b5afa42833425a0274316dddec3ef9824beb29cc93235eae9ddfa46d7674e2bb80b95b92d4fba
-
Filesize
11KB
MD5c22559393ea1a6c36e4af59d799d8fa4
SHA12f39fb682921dfda006e01a131ed47c14153b206
SHA256983f5fb62a934be060acec9945fd286847f51d0b2fc0120b558e2c5d97f72884
SHA51239f4774fef7b0bf28d53e08581a080c16e95455ee57ccfb50a286f798b738de02119e646870b5aa009338c0539ee6fd46bffa7d6628715970c9801d54a5036e8
-
Filesize
15KB
MD5c97b53ebc9031b9dfb7e70b231b03a41
SHA1f3a5adc5baa144f36feafe1cedb6ec2cea55da8e
SHA2560f1427c25b04d08fb35542c9b0e1d4bfe90b5e7ede3f9fcb6fb11f62c02ae8b2
SHA512914fd6b5c17267a66fd6fe75f76669af0e31e31b0a7e3ec7b14ff6ece5fe0f27dbe0001190310ce32dd8c3c7c5c280e1db9b4b12be04da0af5fd6ebea9e54d40
-
Filesize
18KB
MD5e3a9d8b2d08bf61d6d2a862e114286fc
SHA167c328073aa7919403d3cda3e374b1094e71d075
SHA256077760316ebb5f762dddaf75ace3f38d56391f50b8ee1354c88ebe573153ebc0
SHA512abea3c9017dd89c0e582fe14ed16523f429e02903103012ea740893ba29030ab9aed79fc283761886f5efb544f2372d8112005192c37e920f2c914e6870bea23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD594978e8889069302e40d8ceac8a1ea67
SHA103cc3fbc0003c34dc7020b94b028e47d73492770
SHA25693a725a510d2b2a6a0d29b543cd22c1142c169658c238c5705711acf02aee4e9
SHA512218ec4f7b4864a5733e5d58855734387bcac5a5c077c2537f494424803838011dbc58538b078108e27626f2a2bdb10c0aa2215ea604af9ad615cea886a5ed7a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58f3184028ead6b5ace72e8c378b6115d
SHA18661acaae12f90ad406c6968a1876779ce01f6af
SHA25605780f75f099cc48f3e08c8819029b83616a3edccca404634a40581e1fd90d60
SHA5128964c9c8497ca8799cb5a4aa9b20f86e386d5c4760e0c2f0a844295b85a8bc3c4c53f2d66553235dd93011358de5fe42827eed9b5ace8d047f61a949d0736656
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ff40.TMP
Filesize48B
MD5221232c522af70458d96b02337757dd5
SHA15f721eadb728612e0809938b187cd442d99b06d1
SHA256cc7016cb75f326fc46e6c343046f320557b6eaf2768cb2ec6798d5b2d0ae1e7d
SHA512940378068785dc8137103c257bd18177f8622a9d7431c6e65d334af9abfbdf7bf8a5fe0367861401b5116fb9455dade79fca25849ed7640b31f9114551cb63ab
-
Filesize
80KB
MD550f4b970ec5b55afb54701c25d8187e1
SHA1cce934728bcc57ea387186413828c23f9a838232
SHA2567d5cef13829938974af9de3d21bda465a3e89684b07e073fa13f6f8b36c2f243
SHA51240caecba3c39d0e8db62a591923acb6b2b928b37b886a3378cc043d72763d824b38d2ea9430baa092d192e801b44fbf83e90244f5a49400d4e6849982270b813
-
Filesize
153KB
MD5789c0d86076ab16a210b12489cbc9927
SHA14f3dfa08c64f273ea8fc071ed3fafb09592fc268
SHA2561c890baa927e7791e9feba0a4914c587bda563b6097c07b1532f6da19a6c77fb
SHA512a43e5ab5d5aedd1e9054ce3866bf7a94d204d99daf6f3358db83f36efd1a994c92e716f58d4d50d1205fd45ec9d8b312a5ce043b8c77833ffb39054326651e34
-
Filesize
154KB
MD5a117e4330eb19b7a507da6db0d174126
SHA10e884e1cc9961260c7bc0fa33ca88e45f7738ede
SHA25605936e9ca3dc84b713db8378f1ba1b7800a8dc0050b0f11045161a8ea2e011d2
SHA5129d69ab5ab885e9715dc8a6d9a782d729c2aadadd489a90776988fe75bbf3f35431313cfb6b8ca981b0fef4365ff1cc3d7a9196e6c35cebfb82a353792cef7a47
-
Filesize
1KB
MD51880779a8933441a9b62963c6eeaff4a
SHA17b75c157d3768940546c8f5bf05fd3fe9f0820da
SHA256e6f61045c8651fca7659d104824b4542a5d24f23b171b957076a2e9e26f3c641
SHA5126f1135548cd1dbaaf5a77f9e53f82bd3aebb168c7217cbcccaabd081faec0333a3281d3300f35c74eea448b0ade9c064ccdd5088376f415dcacb3c5729e0ae26
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1684_2069183217\c56df86b-28a8-4ae1-a36a-5fc77b44e28c.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
75KB
MD5344cf3c21802a6e45329cf892f3da55f
SHA1324a7436eca379b2d81ed3344f7b688cf186799a
SHA256a84d4d5e7cc0f14154bfa8d4c2fb8a9db3b13c457b8ef51c2ed9dac174693cc0
SHA512f4b786ff3341076210d16aac23a95813ede84c088adcd90f8b49fb4a0f7d3a6d5c28e1977ebc8735c6be005bd3a572f41d9b894060395c3f964961dea8e3a038
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD56b49345774fd0cd9c4cd6457d5df693f
SHA18b98867954dbc163f7aa30e87aadeeae6999d303
SHA25698f81ffb0d56a7e99a1b5904258bf6877e5bee48f35369097ce94b7ff86c2b14
SHA51218184cc1e9dc835a64768ab620eb9fd11a14bd0043cb9aa8d20f650a678b26bfc023fcd75656ed1d42d599feda16202737c521b2fef32d29f6b426056bc8b9aa
-
Filesize
215KB
MD55c571c69dd75c30f95fe280ca6c624e9
SHA1b0610fc5d35478c4b95c450b66d2305155776b56
SHA256416774bf62d9612d11d561d7e13203a3cbc352382a8e382ade3332e3077e096c
SHA5128e7b9a4a514506d9b8e0f50cc521f82b5816d4d9c27da65e4245e925ec74ac8f93f8fe006acbab5fcfd4970573b11d7ea049cc79fb14ad12a3ab6383a1c200b2
-
Filesize
322KB
MD589f4a9c9e94617e7a9454bbc95a9f63c
SHA139a38a61449a2a61d384be8c428950b7c2cca04d
SHA256c856d820cb6eed50d145c12a0e858769523b11fb09e8ff0af71c43ad92c53353
SHA5128e56eceb8477ff6b9417ec48222588305b06124dbd69829a053dfb6ee87f9b8ca587f5a18abb477f165c70c058acf06c5d6632de76537c6d4bd064e3b871e84a