Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:21
Static task
static1
Behavioral task
behavioral1
Sample
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe
Resource
win10v2004-20220414-en
General
-
Target
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe
-
Size
3.7MB
-
MD5
dcab6a3b553a1bce6c3202ba1d5b60bb
-
SHA1
89c7c300b75e288247dc767748934beacf44c62e
-
SHA256
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910
-
SHA512
0143699c3600484dcce96d056c7bf6891e6fd9e8cc7e0a88aee350b49e257fbb7cae2028174ce1e2cf5f10bf8fed870101db5c745b670a8716a397e2c988489d
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
msng.exepid process 3732 msng.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
msedge.exedcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exemsng.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msng.exedescription ioc process File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe File opened (read-only) \??\a: msng.exe -
Drops file in System32 directory 7 IoCs
Processes:
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exemsng.exedescription ioc process File created C:\Windows\SysWOW64\rundII32.exe dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe File created C:\Windows\SysWOW64\rundll32.exe dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe File created C:\Windows\SysWOW64\msng.exe dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe File opened for modification C:\Windows\SysWOW64\msng.exe dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\02ccdaf9-06d1-41b0-b959-b20dc2639a49.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220521002550.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 37 IoCs
Processes:
explorer.exemsedge.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000008f54ec0b100041646d696e003c0009000400efbe8f54c206b554f3022e0000007fe101000000010000000000000000000000000000004ca9ea00410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008f54c20612004170704461746100400009000400efbe8f54c206b554f3022e0000008ae101000000010000000000000000000000000000008338f4004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000008f54800910004c6f63616c003c0009000400efbe8f54c206b554f3022e0000009de10100000001000000000000000000000000000000c3ab2d014c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = ca00310000000000b554f30210004443463032327e310000b20009000400efbeb554f302b554f3022e000000b43102000000070000000000000000000000000000002a7ae7006400630066003000320032006300380033006400640033003000390030006100620039003300640033003300310066006100640062003400630031003400350062006500640033003300320033006100620061003100650031003000650036003800630061006600300039003600390062003200340063003500390031003000000018000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000008f54c2061100557365727300640009000400efbe874f7748b554f3022e000000c70500000000010000000000000000003a0000000000d26d0e0155007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e00310000000000b554f302100054656d7000003a0009000400efbe8f54c206b554f3022e0000009ee101000000010000000000000000000000000000002a7ae700540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msng.exemsedge.exepid process 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 4368 msedge.exe 4368 msedge.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe 3732 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msng.exepid process 3732 msng.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exemsng.exeexplorer.exepid process 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe 3732 msng.exe 4160 explorer.exe 4160 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exemsng.exeexplorer.exemsedge.exedescription pid process target process PID 768 wrote to memory of 3672 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe explorer.exe PID 768 wrote to memory of 3672 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe explorer.exe PID 768 wrote to memory of 3672 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe explorer.exe PID 768 wrote to memory of 3732 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe msng.exe PID 768 wrote to memory of 3732 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe msng.exe PID 768 wrote to memory of 3732 768 dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe msng.exe PID 3732 wrote to memory of 624 3732 msng.exe explorer.exe PID 3732 wrote to memory of 624 3732 msng.exe explorer.exe PID 3732 wrote to memory of 624 3732 msng.exe explorer.exe PID 804 wrote to memory of 1420 804 explorer.exe msedge.exe PID 804 wrote to memory of 1420 804 explorer.exe msedge.exe PID 1420 wrote to memory of 1968 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 1968 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 3908 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4368 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4368 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe PID 1420 wrote to memory of 4132 1420 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe"C:\Users\Admin\AppData\Local\Temp\dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c59102⤵PID:3672
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:624
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4160
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openclose.ir/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb114346f8,0x7ffb11434708,0x7ffb114347183⤵PID:1968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:3908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:83⤵PID:4132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:13⤵PID:944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:13⤵PID:64
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5236 /prefetch:83⤵PID:1372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 /prefetch:83⤵PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:13⤵PID:1376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:13⤵PID:1864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:13⤵PID:3576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:13⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:13⤵PID:2244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3388 /prefetch:23⤵PID:1120
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,13215222014924386510,16721082539167834150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:83⤵PID:4060
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1564 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1e8,0x22c,0x7ff69ec95460,0x7ff69ec95470,0x7ff69ec954804⤵PID:3280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5dcab6a3b553a1bce6c3202ba1d5b60bb
SHA189c7c300b75e288247dc767748934beacf44c62e
SHA256dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910
SHA5120143699c3600484dcce96d056c7bf6891e6fd9e8cc7e0a88aee350b49e257fbb7cae2028174ce1e2cf5f10bf8fed870101db5c745b670a8716a397e2c988489d
-
Filesize
3.7MB
MD5dcab6a3b553a1bce6c3202ba1d5b60bb
SHA189c7c300b75e288247dc767748934beacf44c62e
SHA256dcf022c83dd3090ab93d331fadb4c145bed3323aba1e10e68caf0969b24c5910
SHA5120143699c3600484dcce96d056c7bf6891e6fd9e8cc7e0a88aee350b49e257fbb7cae2028174ce1e2cf5f10bf8fed870101db5c745b670a8716a397e2c988489d
-
Filesize
100B
MD562bc1d702b4a69f188b417bb1dcbd11b
SHA16ab82d05924aeff05d00cd54bf152276875195b3
SHA2567187fd637a29523b57e83824c2de1fbce670abe5c38f620da681acd177076887
SHA512e0c814701a6f1b43820154bed493ddefd804bfbcd64469e86a2ae7d1bcdb2cae2192e1a355045791dec2397e62f8d24fecf42c71b67eda5fc2b728291be8ccf8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e