File name:

Ransomware.Cerber.zip

Full analysis: https://app.any.run/tasks/7ef417e8-d1cc-4f21-9c58-d0ee79dfd4d0
Verdict: Malicious activity
Threats:

Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.

Analysis date: December 02, 2023, 21:08:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
cerber
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

5C571C69DD75C30F95FE280CA6C624E9

SHA1:

B0610FC5D35478C4B95C450B66D2305155776B56

SHA256:

416774BF62D9612D11D561D7E13203A3CBC352382A8E382ADE3332E3077E096C

SSDEEP:

3072:EJk9kcytz1Qg4kViSMoq9OsLvz8L5HINY8lYdeIX8woWJQHr6LqK2fU0MwL0b06R:EUkcyVlDq8rIblYomoWnvfp0g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CERBER has been detected (SURICATA)

      • cerber.exe (PID: 3872)
    • Connects to the CnC server

      • cerber.exe (PID: 3872)
    • Actions looks like stealing of personal data

      • cerber.exe (PID: 3872)
  • SUSPICIOUS

    • Creates files like ransomware instruction

      • cerber.exe (PID: 3872)
    • Start notepad (likely ransomware note)

      • cerber.exe (PID: 3872)
    • Reads the Internet Settings

      • cerber.exe (PID: 3872)
      • mshta.exe (PID: 2076)
    • Starts CMD.EXE for commands execution

      • cerber.exe (PID: 3872)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 3892)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 3892)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2740)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2740)
      • cerber.exe (PID: 3872)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2740)
      • cerber.exe (PID: 3872)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2980)
    • Reads the machine GUID from the registry

      • cerber.exe (PID: 3872)
    • Create files in a temporary directory

      • cerber.exe (PID: 3872)
    • Creates files or folders in the user directory

      • cerber.exe (PID: 3872)
    • Dropped object may contain TOR URL's

      • cerber.exe (PID: 3872)
    • The dropped object may contain a URL to Tor Browser

      • cerber.exe (PID: 3872)
    • Checks proxy server information

      • mshta.exe (PID: 2076)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2017:05:23 21:17:36
ZipCRC: 0xed332b67
ZipCompressedSize: 220092
ZipUncompressedSize: 619008
ZipFileName: cerber.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs wmpnscfg.exe no specs #CERBER cerber.exe mshta.exe notepad.exe no specs cmd.exe no specs taskkill.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\_R_E_A_D___T_H_I_S___8A2AUZ_.txtC:\Windows\System32\notepad.execerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2076"C:\Windows\System32\mshta.exe" "C:\Users\admin\Desktop\_R_E_A_D___T_H_I_S___LZU41_.hta" C:\Windows\System32\mshta.exe
cerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2740"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2980"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Ransomware.Cerber.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2996ping -n 1 127.0.0.1 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
3872"C:\Users\admin\AppData\Local\Temp\Rar$EXb2980.29695\cerber.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2980.29695\cerber.exe
WinRAR.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb2980.29695\cerber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3892"C:\Windows\system32\cmd.exe"C:\Windows\System32\cmd.execerber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3940taskkill /f /im "cerber.exe" C:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
6 608
Read events
6 554
Write events
54
Delete events
0

Modification events

(PID) Process:(2980) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
1
Suspicious files
38
Text files
39
Unknown types
4

Dropped files

PID
Process
Filename
Type
3872cerber.exeC:\Users\admin\AppData\Local\Temp\90059c37\1320.tmpbinary
MD5:9D64B7AB9FFEEC7AEE302D91F59274E6
SHA256:CDBE53FE297310A836336ADA1A9EDA683B15686F40BFF68A47D67C4CF5C98881
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\-v0nAblSOV.b58dbinary
MD5:B42E2CA8ECD2D166B0F82B13F68C2ECD
SHA256:1CFE8095D65814901A6E60C5BCB6F2DB822A56C6ACD96C400D1B9B20175E6302
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\onenote\14.0\preferences.datbinary
MD5:157301889B40A81DAC228701D62E8535
SHA256:D4C85CF43235AEEFA235DDDCDE1B2E5B4DC7ACFFF08B3BA69C5FDADD1CA63F24
2980WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2980.29695\cerber.exeexecutable
MD5:8B6BC16FD137C09A08B02BBE1BB7D670
SHA256:E67834D1E8B38EC5864CFA101B140AEABA8F1900A6E269E6A94C90FCBFE56678
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\onenote\14.0\_R_E_A_D___T_H_I_S___WYAVJ9_.txttext
MD5:FE8AA0AF8A86B5C2B707B2EA58ACBF9E
SHA256:DB2C649A4B0C2BEB26815B58B748F76617A259A1A25A7A4B39B59BEAA15514C8
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\5e5hXPqsaT.b58dbinary
MD5:6117336508851CDF54F261BE70D491CA
SHA256:7D13200D71142EF634E4B21DD2B4DF045FDD574292E4BF064D4339BF248DDB7F
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\onenote\14.0\_R_E_A_D___T_H_I_S___PP3PJ782_.htahtml
MD5:C9C0F410994AE8CDF8EC467308E16ACA
SHA256:34CE2EEAF527FA0F5DD24EA766111C54398D6E6DDC6DF61CB4648202423DEACB
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\nomail.srsbinary
MD5:B42E2CA8ECD2D166B0F82B13F68C2ECD
SHA256:1CFE8095D65814901A6E60C5BCB6F2DB822A56C6ACD96C400D1B9B20175E6302
3872cerber.exeC:\Users\admin\AppData\Roaming\Microsoft\Outlook\W5GOXbznk3.b58dbinary
MD5:C2744A80C4E7220C312CA99DA74ADFDD
SHA256:7D8E919B94B3AC09DFC74FA76EB82A7DAF2857F0FA9FB7389E4FD1B51B95C1CA
3872cerber.exeC:\users\admin\appdata\roaming\microsoft\outlook\_R_E_A_D___T_H_I_S___IDWS_.htahtml
MD5:C9C0F410994AE8CDF8EC467308E16ACA
SHA256:34CE2EEAF527FA0F5DD24EA766111C54398D6E6DDC6DF61CB4648202423DEACB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
2 186
DNS requests
7
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2076
mshta.exe
GET
403
104.20.20.251:80
http://api.blockcypher.com/v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1701551331543
unknown
binary
98 b
unknown
2076
mshta.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?adc3513a0979055d
unknown
compressed
4.66 Kb
unknown
2076
mshta.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEH1NQqkrQx1%2BZFPnwZqNWHc%3D
unknown
binary
1.41 Kb
unknown
2076
mshta.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/alphasslcasha256g4/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSPdwLcDiHQXlVfp8h37hrpMerTggQUT8usqMLvq92Db2u%2Fzpg9XFgldhUCDGaeFTwW0pzC%2Bwovsg%3D%3D
unknown
binary
1.40 Kb
unknown
2076
mshta.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
binary
1.47 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
whitelisted
3872
cerber.exe
178.33.158.2:6893
unknown
3872
cerber.exe
178.33.158.3:6893
unknown
3872
cerber.exe
178.33.158.4:6893
unknown
3872
cerber.exe
178.33.158.1:6893
unknown
3872
cerber.exe
178.33.158.5:6893
unknown
3872
cerber.exe
178.33.158.0:6893
unknown
3872
cerber.exe
178.33.158.6:6893
unknown
3872
cerber.exe
178.33.158.7:6893
unknown

DNS requests

Domain
IP
Reputation
api.blockcypher.com
  • 104.20.20.251
  • 104.20.21.251
  • 172.67.2.88
whitelisted
btc.blockr.io
unknown
bitaps.com
  • 178.128.255.179
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
chain.so
  • 172.67.74.49
  • 104.26.8.86
  • 104.26.9.86
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
3872
cerber.exe
Malware Command and Control Activity Detected
ET MALWARE Ransomware/Cerber Checkin M3 (13)
1 ETPRO signatures available at the full report
No debug info