| File name: | Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.7z |
| Full analysis: | https://app.any.run/tasks/b1c635b8-f5c1-44f1-b8b1-e7e6df9b5f28 |
| Verdict: | Malicious activity |
| Threats: | Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss. |
| Analysis date: | April 29, 2025, 21:51:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | E3D815163AFDDCA655CC319F0F804103 |
| SHA1: | 08ADC9EA5BD6CFA8E780D9FB0C6983E2BFEB854A |
| SHA256: | 1C4819A0FC906D37386472C9859F9176FB7BAC637E6ECCC15E21DF31AA8B0C9B |
| SSDEEP: | 3072:IJ5W+wWLI1onFF2e9QUiQQEvl9VIPpuxaaL78ks:M4WLz2gQIvvqUhL5s |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2017:03:05 22:23:38+00:00 |
| ArchivedFileName: | Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 --field-trial-handle=1304,i,4177071377510477583,5345970103072673720,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 220 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1552 --field-trial-handle=1304,i,4177071377510477583,5345970103072673720,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 109.0.1518.115 Modules
| |||||||||||||||
| 328 | "C:\Users\admin\Desktop\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe" | C:\Users\admin\Desktop\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe | explorer.exe | ||||||||||||
User: admin Company: Whiffles Hee Integrity Level: HIGH Description: courb destructing Exit code: 0 Version: 6.6.0.13695 Modules
| |||||||||||||||
| 912 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\# DECRYPT MY FILES #.vbs" | C:\Windows\System32\wscript.exe | — | BdeUnlockWizard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 988 | "C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\BdeUnlockWizard.exe" | C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\BdeUnlockWizard.exe | Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe | ||||||||||||
User: admin Company: Whiffles Hee Integrity Level: HIGH Description: courb destructing Exit code: 0 Version: 6.6.0.13695 Modules
| |||||||||||||||
| 996 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --enable-features=msMicrosoftRootStoreUsed --flag-switches-end --do-not-de-elevate http://cerberhhyed5frqa.xmfir0.win/0E6A-7CD7-32AE-0063-70D3 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1080 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1168 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\admin\Desktop\# DECRYPT MY FILES #.html | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | BdeUnlockWizard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1224 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.7z | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 1336 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1304,i,4177071377510477583,5345970103072673720,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 109.0.1518.115 Modules
| |||||||||||||||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (1080) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet |
| Operation: | write | Name: | {4040CF00-1B3E-486A-B407-FA14C56B6FC0} |
Value: D4DA6D39D73C | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.7z | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1224 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb1224.31474\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe | executable | |
MD5:F06F331393CEB572DCCD09C0176FC6BF | SHA256:E54F555DB8F72232D7C130104C6B8CC5B32887634E8E2DA7158252E3C0CAF6F3 | |||
| 328 | Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BdeUnlockWizard.lnk | binary | |
MD5:38CE0DFD4FE30CA3D0E0266FB3734D44 | SHA256:E6784EC4D6493632309F4A256CD26A2E2A6082D24CAEA3B456A8AB4C5EE5CE97 | |||
| 328 | Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe | C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\BdeUnlockWizard.exe | executable | |
MD5:F06F331393CEB572DCCD09C0176FC6BF | SHA256:E54F555DB8F72232D7C130104C6B8CC5B32887634E8E2DA7158252E3C0CAF6F3 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\AppData\Roaming\Notepad++\config.xml | binary | |
MD5:CA30D9A39EF7F6DA1E7EF8B85906F582 | SHA256:0F79E243C8BBCF6317EB99A0EE5B68B7D0524DC238D9C5CED2F67CAA77785BC7 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\json[1].json | binary | |
MD5:C0F25B1F2A7CF4E0DCFD1C530E98EC90 | SHA256:FA52581A25BBE45EC9B9C8088FAA13EBC492E1C4F13AFB69C75102F7770FC3A8 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\Downloads\8iLAjj39j2.cerber | binary | |
MD5:E903195240110BCC1A257CDA41D8F6E0 | SHA256:1E899018595FCB04E4912BA085313FF4E4D59BF7381CBD5E8D11E0E0C1C63A20 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\json[1].htm | html | |
MD5:E89F75F918DBDCEE28604D4E09DD71D7 | SHA256:6DC9C7FC93BB488BB0520A6C780A8D3C0FB5486A4711ACA49B4C53FAC7393023 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\Pictures\consumersep.jpg | binary | |
MD5:7962873F1E90A0CDA4449CB563E8F4D8 | SHA256:A2266E08F1E6BA421DD6A44AEB2F8656738775D5DC446575C1486A91622E4AD5 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\Downloads\edgestories.png | binary | |
MD5:E903195240110BCC1A257CDA41D8F6E0 | SHA256:1E899018595FCB04E4912BA085313FF4E4D59BF7381CBD5E8D11E0E0C1C63A20 | |||
| 988 | BdeUnlockWizard.exe | C:\Users\admin\Documents\rentalsarticle.rtf | binary | |
MD5:C5234A97570AF9F66AA214155FCD6703 | SHA256:C187A842A342EC1AEC61ED3514CAA6259FE22BA2718E70FA800BA482444D239A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
988 | BdeUnlockWizard.exe | GET | 403 | 34.117.59.81:80 | http://ipinfo.io/json | unknown | — | — | whitelisted |
988 | BdeUnlockWizard.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
988 | BdeUnlockWizard.exe | GET | 200 | 15.197.148.33:80 | http://freegeoip.net/json/ | unknown | — | — | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
988 | BdeUnlockWizard.exe | 85.93.0.0:6892 | — | — | — | unknown |
988 | BdeUnlockWizard.exe | 85.93.0.1:6892 | — | — | — | unknown |
988 | BdeUnlockWizard.exe | 85.93.0.2:6892 | — | — | — | unknown |
988 | BdeUnlockWizard.exe | 85.93.0.10:6892 | — | — | — | unknown |
988 | BdeUnlockWizard.exe | 85.93.0.7:6892 | — | — | — | unknown |
988 | BdeUnlockWizard.exe | 85.93.0.6:6892 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
ipinfo.io |
| whitelisted |
freegeoip.net |
| shared |
ip-api.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
cerberhhyed5frqa.xmfir0.win |
| unknown |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
988 | BdeUnlockWizard.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
988 | BdeUnlockWizard.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (freegeiop .net in DNS lookup) |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |