File name:

Ransomware.Cerber.zip

Full analysis: https://app.any.run/tasks/7ef417e8-d1cc-4f21-9c58-d0ee79dfd4d0
Verdict: Malicious activity
Threats:

Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.

Analysis date: December 02, 2023, 21:08:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
cerber
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

5C571C69DD75C30F95FE280CA6C624E9

SHA1:

B0610FC5D35478C4B95C450B66D2305155776B56

SHA256:

416774BF62D9612D11D561D7E13203A3CBC352382A8E382ADE3332E3077E096C

SSDEEP:

3072:EJk9kcytz1Qg4kViSMoq9OsLvz8L5HINY8lYdeIX8woWJQHr6LqK2fU0MwL0b06R:EUkcyVlDq8rIblYomoWnvfp0g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CERBER has been detected (SURICATA)

      • cerber.exe (PID: 3872)
    • Actions looks like stealing of personal data

      • cerber.exe (PID: 3872)
    • Connects to the CnC server

      • cerber.exe (PID: 3872)
  • SUSPICIOUS

    • Creates files like ransomware instruction

      • cerber.exe (PID: 3872)
    • Start notepad (likely ransomware note)

      • cerber.exe (PID: 3872)
    • Reads the Internet Settings

      • mshta.exe (PID: 2076)
      • cerber.exe (PID: 3872)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 3892)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 3892)
    • Starts CMD.EXE for commands execution

      • cerber.exe (PID: 3872)
  • INFO

    • Reads the computer name

      • wmpnscfg.exe (PID: 2740)
      • cerber.exe (PID: 3872)
    • Checks supported languages

      • cerber.exe (PID: 3872)
      • wmpnscfg.exe (PID: 2740)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2740)
    • Creates files or folders in the user directory

      • cerber.exe (PID: 3872)
    • Reads the machine GUID from the registry

      • cerber.exe (PID: 3872)
    • Checks proxy server information

      • mshta.exe (PID: 2076)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2980)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2076)
    • Create files in a temporary directory

      • cerber.exe (PID: 3872)
    • The dropped object may contain a URL to Tor Browser

      • cerber.exe (PID: 3872)
    • Dropped object may contain TOR URL's

      • cerber.exe (PID: 3872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2017:05:23 21:17:36
ZipCRC: 0xed332b67
ZipCompressedSize: 220092
ZipUncompressedSize: 619008
ZipFileName: cerber.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs wmpnscfg.exe no specs #CERBER cerber.exe mshta.exe notepad.exe no specs cmd.exe no specs taskkill.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\_R_E_A_D___T_H_I_S___8A2AUZ_.txtC:\Windows\System32\notepad.execerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2076"C:\Windows\System32\mshta.exe" "C:\Users\admin\Desktop\_R_E_A_D___T_H_I_S___LZU41_.hta" C:\Windows\System32\mshta.exe
cerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2740"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2980"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Ransomware.Cerber.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2996ping -n 1 127.0.0.1 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
3872"C:\Users\admin\AppData\Local\Temp\Rar$EXb2980.29695\cerber.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2980.29695\cerber.exe
WinRAR.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb2980.29695\cerber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3892"C:\Windows\system32\cmd.exe"C:\Windows\System32\cmd.execerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3940taskkill /f /im "cerber.exe" C:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
6 608
Read events
6 554
Write events
54
Delete events
0

Modification events

(PID) Process:(2980) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
1
Suspicious files
38
Text files
39
Unknown types
4

Dropped files

PID
Process
Filename
Type
3872cerber.exeC:\Users\admin\AppData\Local\Temp\90059c37\1320.tmpbinary
MD5:9D64B7AB9FFEEC7AEE302D91F59274E6
SHA256:CDBE53FE297310A836336ADA1A9EDA683B15686F40BFF68A47D67C4CF5C98881
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\5e5hXPqsaT.b58dbinary
MD5:6117336508851CDF54F261BE70D491CA
SHA256:7D13200D71142EF634E4B21DD2B4DF045FDD574292E4BF064D4339BF248DDB7F
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\sb0YOwEr8e.b58dbinary
MD5:3EFB6C9F85B6083F7FB71B603B14C92B
SHA256:9C92764E4EFC8B8D1783DF3F0159E69263EDB67151A20C3A7F5B47171B8A0F75
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\_R_E_A_D___T_H_I_S___IDWS_.htahtml
MD5:C9C0F410994AE8CDF8EC467308E16ACA
SHA256:34CE2EEAF527FA0F5DD24EA766111C54398D6E6DDC6DF61CB4648202423DEACB
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\outlook.srsbinary
MD5:6117336508851CDF54F261BE70D491CA
SHA256:7D13200D71142EF634E4B21DD2B4DF045FDD574292E4BF064D4339BF248DDB7F
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\onenote\14.0\preferences.datbinary
MD5:157301889B40A81DAC228701D62E8535
SHA256:D4C85CF43235AEEFA235DDDCDE1B2E5B4DC7ACFFF08B3BA69C5FDADD1CA63F24
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\test.xmlbinary
MD5:C2744A80C4E7220C312CA99DA74ADFDD
SHA256:7D8E919B94B3AC09DFC74FA76EB82A7DAF2857F0FA9FB7389E4FD1B51B95C1CA
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\test.srsbinary
MD5:3EFB6C9F85B6083F7FB71B603B14C92B
SHA256:9C92764E4EFC8B8D1783DF3F0159E69263EDB67151A20C3A7F5B47171B8A0F75
3872cerber.exeC:\Users\admin\Documents\JGpP5iOnge.b58dtext
MD5:E45C5131E0195CF8BD36BC03A995CE7D
SHA256:2EF45C33720A1A4DC7740D51E1DAFD02751C63D18200B76FC89832901BF7A7AA
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\W5GOXbznk3.b58dbinary
MD5:C2744A80C4E7220C312CA99DA74ADFDD
SHA256:7D8E919B94B3AC09DFC74FA76EB82A7DAF2857F0FA9FB7389E4FD1B51B95C1CA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
2 186
DNS requests
7
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2076
mshta.exe
GET
403
104.20.20.251:80
http://api.blockcypher.com/v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1701551331543
unknown
binary
98 b
unknown
2076
mshta.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?adc3513a0979055d
unknown
compressed
4.66 Kb
unknown
2076
mshta.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEH1NQqkrQx1%2BZFPnwZqNWHc%3D
unknown
binary
1.41 Kb
unknown
2076
mshta.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/alphasslcasha256g4/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSPdwLcDiHQXlVfp8h37hrpMerTggQUT8usqMLvq92Db2u%2Fzpg9XFgldhUCDGaeFTwW0pzC%2Bwovsg%3D%3D
unknown
binary
1.40 Kb
unknown
2076
mshta.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
binary
1.47 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
whitelisted
3872
cerber.exe
178.33.158.2:6893
unknown
3872
cerber.exe
178.33.158.3:6893
unknown
3872
cerber.exe
178.33.158.4:6893
unknown
3872
cerber.exe
178.33.158.1:6893
unknown
3872
cerber.exe
178.33.158.5:6893
unknown
3872
cerber.exe
178.33.158.0:6893
unknown
3872
cerber.exe
178.33.158.6:6893
unknown
3872
cerber.exe
178.33.158.7:6893
unknown

DNS requests

Domain
IP
Reputation
api.blockcypher.com
  • 104.20.20.251
  • 104.20.21.251
  • 172.67.2.88
whitelisted
btc.blockr.io
unknown
bitaps.com
  • 178.128.255.179
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
chain.so
  • 172.67.74.49
  • 104.26.8.86
  • 104.26.9.86
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
3872
cerber.exe
Malware Command and Control Activity Detected
ET MALWARE Ransomware/Cerber Checkin M3 (13)
1 ETPRO signatures available at the full report
No debug info