| File name: | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7z |
| Full analysis: | https://app.any.run/tasks/bf065701-1144-4b29-bfa2-13a6eb8d9600 |
| Verdict: | Malicious activity |
| Threats: | Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss. |
| Analysis date: | April 27, 2025, 17:44:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | DC47824B5BD8B93024526A951ACBFF2B |
| SHA1: | 386AFCC3372B0B7B7FD02C43BCB8CE1BAD9BB1C0 |
| SHA256: | 10778C95554F8C3B95005BD2E1A5BE07754BDF8D966B5D35E1ADCDB0ABF9F410 |
| SSDEEP: | 6144:+uc14RCmJ03fSHd3FK1qr7B/+wN/ft6U49CAhe0eVLzGZmQqBTDJEe:+uc14kmJ03wVKa7B/vfoBvhebHcCB/Jr |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2017:05:03 07:02:10+00:00 |
| ArchivedFileName: | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 704 | "C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe" | C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 752 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3888 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 756 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1072 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:3 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | msedge.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1880 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4556 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1980 | taskkill /f /im "HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe" | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2060 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7z | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2068 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1272 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 2336 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3116 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 2516 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2336 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7z | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.18203\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | executable | |
MD5:1306783305417FE3BFB813A158DB08EC | SHA256:849AA2E275D84C05213F95F764331DF0DD743B17B32F61174AC45946544F67EB | |||
| 3140 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\jquery.touchwipe.min.js | binary | |
MD5:9268DC7F6A871944D3974A495F659CE8 | SHA256:63500B6B7E794EFF658C7B31AAB9154B682DDDED20751D5F9D04D6EF65439BBB | |||
| 3140 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\overlay.css | text | |
MD5:15DE621B3A147EB7F4C08213AB39B5E5 | SHA256:C222D6C91EE3195D3E7EE88946C208E49038CE5C7059679DB103651A33777E7B | |||
| 3140 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\detachments.m | binary | |
MD5:A187375F96FB9A4F9422320A8E976A35 | SHA256:D03EBE124C30F6BBF3A091BA2F95B288E1BCBBEF88D3527CDD170DD217E2F975 | |||
| 3140 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\customStyles.css | text | |
MD5:6D88FCC171C3B237A81E9624B055AAA3 | SHA256:4E20F2BB58D90B2871859178B7102B3BCE8CF55C273FC4188F2902B3AD55BA64 | |||
| 3140 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\nsv416A.tmp\System.dll | executable | |
MD5:CA332BB753B0775D5E806E236DDCEC55 | SHA256:DF5AE79FA558DC7AF244EC6E53939563B966E7DBD8867E114E928678DBD56E5D | |||
| 704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\AppData\Local\Temp\90059c37\41a4.tmp | text | |
MD5:BE4C9EFE16B5988A0147585FE0B0E6D4 | SHA256:1DC8C753EA2FFECA881CE9210331CFE746B93FBB39C09B7BF41469C2889FB029 | |||
| 704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\Documents\FdNQiaSrvS.b58d | text | |
MD5:EC340E68115468DE0421D2C430ADBC1E | SHA256:CBAD9766F776DD4CF13C54BF50AF3B1D85478A4A6938061ECCF5B6414FD21ED3 | |||
| 704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\Documents\administer.rtf | text | |
MD5:A3C36A3B5D6B6D27A7BB492A7CE8B177 | SHA256:2AE2883FC39D2C6E8168B2570CCDB9F4FEBF4FA8BE1F27BD2E2575BF493FB53A | |||
| 704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | C:\Users\admin\Documents\atrent.rtf | text | |
MD5:EC340E68115468DE0421D2C430ADBC1E | SHA256:CBAD9766F776DD4CF13C54BF50AF3B1D85478A4A6938061ECCF5B6414FD21ED3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3004 | mshta.exe | GET | 403 | 172.67.17.223:80 | http://api.blockcypher.com/v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1745775896328 | unknown | — | — | whitelisted |
1072 | msedge.exe | GET | 301 | 150.171.28.10:80 | http://bing.com/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.1:6892 | — | — | — | unknown |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.3:6892 | — | — | — | unknown |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.4:6892 | — | — | — | unknown |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.0:6892 | — | — | — | unknown |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.2:6892 | — | — | — | unknown |
704 | HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe | 90.2.1.8:6892 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
api.blockcypher.com |
| whitelisted |
btc.blockr.io |
| unknown |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
ntp.msn.com |
| whitelisted |
assets.msn.com |
| whitelisted |
img-s-msn-com.akamaized.net |
| whitelisted |
sb.scorecardresearch.com |
| whitelisted |
th.bing.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3004 | mshta.exe | A Network Trojan was detected | RANSOMWARE [ANY.RUN] Cerber Blockchain has been detected |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (maxcdn .bootstrapcdn .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (maxcdn .bootstrapcdn .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
1072 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |