Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15/04/2022, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe
Resource
win10v2004-20220414-en
General
-
Target
e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe
-
Size
3.1MB
-
MD5
c69bef29e31e00acfd9775ce2c1950aa
-
SHA1
933bc4926e641e9e9329c608f9dec53801cd2eab
-
SHA256
e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7
-
SHA512
c9281c5f5d5abb38038205c8c5a57feda742a1ae1806e8d4d9b32de5d33b692408d3610cfc004bf4c1c1aa35d2a7d546d3f13d9ecd9b778be964f88aad188c79
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\5d8c9112-4a8b-4337-abe4-5ee8c299dbe5.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220415030424.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1908 1812 e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe 75 PID 1812 wrote to memory of 1908 1812 e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe 75 PID 1908 wrote to memory of 4848 1908 msedge.exe 76 PID 1908 wrote to memory of 4848 1908 msedge.exe 76 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5056 1908 msedge.exe 77 PID 1908 wrote to memory of 5068 1908 msedge.exe 78 PID 1908 wrote to memory of 5068 1908 msedge.exe 78 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79 PID 1908 wrote to memory of 4132 1908 msedge.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe"C:\Users\Admin\AppData\Local\Temp\e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdac5d46f8,0x7ffdac5d4708,0x7ffdac5d47183⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5440 /prefetch:83⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4888 /prefetch:83⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:13⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:13⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:83⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6a33c5460,0x7ff6a33c5470,0x7ff6a33c54804⤵PID:4708
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:83⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6044 /prefetch:83⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2052,7952682360375525007,17076620667821013012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:1208
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e081698c980448c0ce820942a645b89fb0f2b390e404b05c061a1eed37c99ee7.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:4724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac5d46f8,0x7ffdac5d4708,0x7ffdac5d47183⤵PID:1392
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54cc65dee4f4121e42bbac3de2af74976
SHA1f08ead10dc9c44c36e601434d8ff2c3213a6744c
SHA256e0d108a52b6881eb8a595e3ec5d00e1f44262081066a6c375194029f21790078
SHA51296aae6a352c815ff1881eeeee8c788d067bf5a5f996956b6cead8ec203255b4f091060acc8a3042f9ad865e7f64ad1c95bd52d62716f57e3679299d399fe61a9