| File name: | wbengine.exe |
| Full analysis: | https://app.any.run/tasks/f6cda6fa-e76f-44d3-915b-b48250ea77cc |
| Verdict: | Malicious activity |
| Threats: | Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss. |
| Analysis date: | January 02, 2024, 11:33:38 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | B83084409598344335BB313288A7034C |
| SHA1: | 2A284B54B395F35095B67441BC857718C2B8058C |
| SHA256: | B5ECEC0F2840E7B3D9635AA9664D6AB245CCD9516CE02C763C13B6947A596FD1 |
| SSDEEP: | 12288:9abdcHRvuz2uFnfpbAw7k3NQGhatUdfY6DmMDMgv0Px:IRcHRGzvTb17kWGa6DmMLcPx |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:08:07 07:33:12+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 16384 |
| InitializedDataSize: | 359936 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x5d315 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 9.3.8708.4860 |
| ProductVersionNumber: | 9.3.8708.4860 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Mokihi |
| FileDescription: | penney dromotropic |
| FileVersion: | 9.3.8708.4860 |
| InternalName: | penney |
| LegalCopyright: | Copyright Mokihi |
| OriginalFileName: | penney.exe |
| ProductName: | penney holosymmetry |
| ProductVersion: | 9.3.8708.4860 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 204 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=3492 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 212 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3360 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 996 | "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | bcdboot.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1072 | "C:\Users\admin\Desktop\wbengine.exe" | C:\Users\admin\Desktop\wbengine.exe | explorer.exe | ||||||||||||
User: admin Company: Mokihi Integrity Level: MEDIUM Description: penney dromotropic Exit code: 0 Version: 9.3.8708.4860 Modules
| |||||||||||||||
| 1192 | "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures | C:\Windows\System32\bcdedit.exe | — | bcdboot.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Boot Configuration Data Editor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1216 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | — | bcdboot.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1268 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3324 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1560 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:1 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1588 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1284 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:2 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1608 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1344 --field-trial-handle=1336,i,4522634664023912471,12706872673298015035,131072 /prefetch:3 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | msedge.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| (PID) Process: | (1216) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1216) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1216) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1216) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2028) bcdboot.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2028) bcdboot.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2028) bcdboot.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2028) bcdboot.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2912) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{345b46fd-a9f9-11e7-a83c-e8a4f72b1d33}\Elements\16000009 |
| Operation: | write | Name: | Element |
Value: 01 | |||
| (PID) Process: | (2028) bcdboot.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2072 | bcdboot.exe | C:\Users\admin\AppData\Local\Temp\FF50.tmp | executable | |
MD5:6EF5F3F18413C367195F06E503AB86A6 | SHA256:6F8B87FB4D67F9E76A51EF759B58A95D903C4AAC9C789A65A3FA1FC4F253D978 | |||
| 1072 | wbengine.exe | C:\Users\admin\AppData\Roaming\{6B977300-2501-F740-F2C0-799D6ACA21C2}\bcdboot.exe | executable | |
MD5:B83084409598344335BB313288A7034C | SHA256:B5ECEC0F2840E7B3D9635AA9664D6AB245CCD9516CE02C763C13B6947A596FD1 | |||
| 2028 | bcdboot.exe | C:\Users\admin\AppData\Roaming\Notepad++\84kcAA9eMp.cerber | binary | |
MD5:7372E2150FF893F05EF7527E026A4D64 | SHA256:0E8F12600338437DA27B7DD2E3C60ABB3BA96F5A14DF2EB6AB64B827DF473DDD | |||
| 1796 | dllhost.exe | C:\Windows\System32\0paT Vm 0 m9MRCB7w\d3d9.dll | executable | |
MD5:63AECFF45A75CF85D2704B30E80AFDD8 | SHA256:C85A0E9D33412950979A60B72081377AE159895B82E2E284EF009FEC79ADB25E | |||
| 1072 | wbengine.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\bcdboot.lnk | binary | |
MD5:5FAA62CACA71DBC92458DEAF96C4543C | SHA256:2DCB1047F9FB843428C1CF9FCFB58394053D6930DBD1D031037CD64818F206BB | |||
| 2028 | bcdboot.exe | C:\Users\admin\AppData\Roaming\Notepad++\session.xml | binary | |
MD5:5EE6D772E22A90A711CE09AC9A31CB6C | SHA256:622C2B5582159293577D6F88538D431F1382A7C43AFCCD43DDB7A3627DACE41C | |||
| 1796 | dllhost.exe | C:\Windows\System32\0paT Vm 0 m9MRCB7w\AdapterTroubleshooter.exe | executable | |
MD5:BDFABEDACD6F18B5EFB14B7529F3ED3E | SHA256:9C971704F26C030424CD5719882DF104C11219F38084C7683BA18FA9B36BFAB2 | |||
| 2028 | bcdboot.exe | C:\Users\admin\Documents\Outlook Files\honey@pot.com.pst | binary | |
MD5:E94B3F7371CD6524C979691F8F577CBF | SHA256:187982809CB49E536AC2B0B300535D4106405C56D8F67696ED33F3BFE1D625D9 | |||
| 2028 | bcdboot.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\json[1].json | binary | |
MD5:E9CBE12A27667399B9D1621BFA4ADD09 | SHA256:B1ADAC4F1534700767723BB9337E75A24D8601BA3305EBCF6DA1CE2FB2925F15 | |||
| 2028 | bcdboot.exe | C:\Users\admin\AppData\Roaming\Notepad++\Slp28p2F1q.cerber | binary | |
MD5:5EE6D772E22A90A711CE09AC9A31CB6C | SHA256:622C2B5582159293577D6F88538D431F1382A7C43AFCCD43DDB7A3627DACE41C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2028 | bcdboot.exe | GET | 200 | 34.117.186.192:80 | http://ipinfo.io/json | unknown | binary | 262 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.1:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.2:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.0:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.3:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.8:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.4:6892 | — | — | — | unknown |
2028 | bcdboot.exe | 85.93.0.6:6892 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
ipinfo.io |
| shared |
cerberhhyed5frqa.slr849.win |
| unknown |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
nav-edge.smartscreen.microsoft.com |
| whitelisted |
data-edge.smartscreen.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2028 | bcdboot.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ipinfo.io |
2028 | bcdboot.exe | Malware Command and Control Activity Detected | ET MALWARE Ransomware/Cerber Checkin 2 |
2028 | bcdboot.exe | Malware Command and Control Activity Detected | ET MALWARE Ransomware/Cerber Checkin M3 (12) |