Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
12-03-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe
Resource
win10v2004-20220310-en
General
-
Target
79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe
-
Size
552KB
-
MD5
34f2cc16d84f7522f05d5333ed3913dd
-
SHA1
b7eed00ff0aa9da390e3f3aca0eaecd6bd685006
-
SHA256
79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3
-
SHA512
f0efd072e7718390aa0371879a2a9eabe01ea29d49063a77df04f37bd9bbfb250fdec95b3df7a1874182aec3af5dd4de78fd6dbb87bbb594fc66243a6765b1f8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\753c63c8-61ca-4a64-a19a-9c83dd959eee.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220312214911.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 1512 msedge.exe 1512 msedge.exe 2676 msedge.exe 2676 msedge.exe 4536 identity_helper.exe 4536 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTcbPrivilege 3312 svchost.exe Token: SeTcbPrivilege 3312 svchost.exe Token: SeTcbPrivilege 3312 svchost.exe Token: SeTcbPrivilege 3312 svchost.exe Token: SeTcbPrivilege 3312 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2676 1616 79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe 82 PID 1616 wrote to memory of 2676 1616 79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe 82 PID 2676 wrote to memory of 1632 2676 msedge.exe 83 PID 2676 wrote to memory of 1632 2676 msedge.exe 83 PID 1616 wrote to memory of 4092 1616 79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe 85 PID 1616 wrote to memory of 4092 1616 79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe 85 PID 4092 wrote to memory of 3740 4092 msedge.exe 86 PID 4092 wrote to memory of 3740 4092 msedge.exe 86 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 2676 wrote to memory of 5064 2676 msedge.exe 94 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93 PID 4092 wrote to memory of 5068 4092 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe"C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb990546f8,0x7ffb99054708,0x7ffb990547183⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:83⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:13⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:13⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:13⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 /prefetch:83⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:13⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:13⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:13⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6408 /prefetch:83⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff6414c5460,0x7ff6414c5470,0x7ff6414c54804⤵PID:3856
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6408 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,2203603526311412175,9657050116299479926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3852 /prefetch:83⤵PID:3320
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb990546f8,0x7ffb99054708,0x7ffb990547183⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10539083950497814288,3782879884928123566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,10539083950497814288,3782879884928123566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2664 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:4956