| File name: | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.7z |
| Full analysis: | https://app.any.run/tasks/62bd6f50-431e-4338-9d7c-78c95ac50361 |
| Verdict: | Malicious activity |
| Threats: | Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss. |
| Analysis date: | April 24, 2025, 20:41:06 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 2881EEBAB0227735BD29097B5BC6120A |
| SHA1: | 3F060D5B8EEB7A45A5F1631D5479E605E26CE9EE |
| SHA256: | 481512F901A868DBA038BB76B76C19E40BA3BCD5289A8EAD521D900C55D24A48 |
| SSDEEP: | 3072:YOzbJX3v+9HzmU9FJ6m0vJuJCpcvsf2qCpamZz62rXb8xl5ZNJ++eiRlZrHi8qQK:YIvGTRJmDpcvsOnZZN6xzPdpHRQTr |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2016:07:20 14:40:58+00:00 |
| ArchivedFileName: | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 328 | /d /c taskkill /t /f /im "netbtugc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\netbtugc.exe" > NUL | C:\Windows\System32\cmd.exe | — | netbtugc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 492 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3172 --field-trial-handle=1304,i,1713592887852891387,12055458640007981988,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 676 | ping -n 1 127.0.0.1 | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 988 | "C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\netbtugc.exe" | C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\netbtugc.exe | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1020 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 --field-trial-handle=1204,i,719118260420261227,4835076219080340165,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1080 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1196 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --enable-features=msMicrosoftRootStoreUsed --flag-switches-end --do-not-de-elevate "C:\Users\admin\Desktop\# DECRYPT MY FILES #.html" | C:\Program Files\Microsoft\Edge\Application\msedge.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1276 | taskkill /t /f /im "netbtugc.exe" | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1504 | /d /c taskkill /t /f /im "Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\admin\Desktop\Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe" > NUL | C:\Windows\System32\cmd.exe | — | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1648 | "C:\Users\admin\Desktop\Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe" | C:\Users\admin\Desktop\Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.7z | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\EngineLoggerConfig.xml | text | |
MD5:3C776D54E30C91AB5003DB046C369C05 | SHA256:B346158E5F2F3F9AE59F06D6129034F71740DC2482187A73BFE857FE8A093002 | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\EUC-V | binary | |
MD5:2AE28D03E6F74FC3C034E3610CAA5280 | SHA256:DF632351D3735A6305DC56D28BFC361F5C028F6B366EBB887480DF32421201DC | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.8335\Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | executable | |
MD5:E980725D25BA54D2712B1A78C95B03AC | SHA256:E31B0FAC00D2520BE4FC094E2BBE3CA8D0537EAE97A87FD38C2EF1346F3E2BFE | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Local\Temp\nsv411D.tmp\System.dll | executable | |
MD5:CA332BB753B0775D5E806E236DDCEC55 | SHA256:DF5AE79FA558DC7AF244EC6E53939563B966E7DBD8867E114E928678DBD56E5D | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\Bibliomania.fh5 | binary | |
MD5:87A1BE58CBDD87C3FBE6AEF78C458EF4 | SHA256:97C282799F83F5D4D1825F4E87BC07861100D0D8AA330F1B9D99D7C168462168 | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\1047_576black.png | image | |
MD5:FBDB5D3BF5606F2D20EC11DFC0523542 | SHA256:B39F7C1B861A0AEA80CA0626E0922B030123828EF4930DA43D424B578459C784 | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\checkbox_normal.png | image | |
MD5:B25853C16A4BF4DB03E508BDC1896B9A | SHA256:C8D93865DF049859558B85A320CFA80D84240DAFC4C35D96306A6CE13036BCB7 | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\but-next.png | image | |
MD5:505F381EBC020405DE2F29DFB0FC2218 | SHA256:78D2571AAD9E004F9FB31672C8195492722BCD42D88EC8ADD5D81A4F8AED8DEA | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\BitFrequency.mm | text | |
MD5:C593BC1CA9F04F16EA5EEF58BAEBAC50 | SHA256:78748624D055829446B9A963BF3B19B3DB2428EAC192ACFA2027C1C80FB3F774 | |||
| 2912 | Trojan-Ransom.NSIS.Agent.i-e31b0fac00d2520be4fc094e2bbe3ca8d0537eae97a87fd38c2ef1346f3e2bfe.exe | C:\Users\admin\AppData\Roaming\CommonMessages_fr.xml | xml | |
MD5:B734C3F8BD71D9A7BDC6B95BEF93CE90 | SHA256:89DEF78B70F8D8B07F1FC794CAF8F6BCF92FFC58893EE1DAF099A574B50D346D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3316 | netbtugc.exe | GET | 200 | 34.117.59.81:80 | http://ipinfo.io/json | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3316 | netbtugc.exe | 31.184.232.2:6892 | — | — | — | unknown |
3316 | netbtugc.exe | 31.184.232.1:6892 | — | — | — | unknown |
3316 | netbtugc.exe | 31.184.232.0:6892 | — | — | — | unknown |
3316 | netbtugc.exe | 31.184.232.3:6892 | — | — | — | unknown |
3316 | netbtugc.exe | 31.184.232.6:6892 | — | — | — | unknown |
3316 | netbtugc.exe | 31.184.232.7:6892 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
ipinfo.io |
| whitelisted |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3316 | netbtugc.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |