Overview
overview
10Static
static
10Channel.url
windows7_x64
6Channel.url
windows10-2004_x64
6Robot.url
windows7_x64
6Robot.url
windows10-2004_x64
3Thanks.vbs
windows7_x64
1Thanks.vbs
windows10-2004_x64
1Trinity to...ls.exe
windows7_x64
10Trinity to...ls.exe
windows10-2004_x64
1Web.url
windows7_x64
6Web.url
windows10-2004_x64
6Analysis
-
max time kernel
22s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 17:42
Static task
static1
Behavioral task
behavioral1
Sample
Channel.url
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Channel.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Robot.url
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Robot.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Thanks.vbs
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Thanks.vbs
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
Trinity tools/Trinity tools.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
Trinity tools/Trinity tools.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
Web.url
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
Web.url
Resource
win10v2004-20220414-en
General
-
Target
Robot.url
-
Size
116B
-
MD5
4127f6d4456cb4a5741f1f7fdc190f4d
-
SHA1
beca1b38b45110b651e833c7bd764840bf3c8e97
-
SHA256
6bd187e01ceda60cad3bce523deb489d7c45c8007c58715c10eeb2adab5c4c23
-
SHA512
43dac583ad53331ded9b9ab526b105ced84ff2ad678f72d6da04ae032ae45b8369dab4ae5464aa76212e2fcc7a1088d584b9fea8c774eba2902038f31d446112
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
rundll32.exemsedge.exedescription pid process target process PID 3976 wrote to memory of 5096 3976 rundll32.exe msedge.exe PID 3976 wrote to memory of 5096 3976 rundll32.exe msedge.exe PID 5096 wrote to memory of 4320 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 4320 5096 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Robot.url1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/deraqoula_bot2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc184d46f8,0x7ffc184d4708,0x7ffc184d47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4120 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5628 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12622283669106395859,15328963696385948345,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:13⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\LOCAL\crashpad_5096_EPCTIXXBJNCVGNXE
-
memory/948-145-0x0000000000000000-mapping.dmp
-
memory/1400-149-0x0000000000000000-mapping.dmp
-
memory/1824-147-0x0000000000000000-mapping.dmp
-
memory/1836-137-0x0000000000000000-mapping.dmp
-
memory/1940-134-0x0000000000000000-mapping.dmp
-
memory/4196-141-0x0000000000000000-mapping.dmp
-
memory/4320-131-0x0000000000000000-mapping.dmp
-
memory/4372-139-0x0000000000000000-mapping.dmp
-
memory/4396-133-0x0000000000000000-mapping.dmp
-
memory/4572-143-0x0000000000000000-mapping.dmp
-
memory/5096-130-0x0000000000000000-mapping.dmp