Analysis
-
max time kernel
156s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 02:49
Static task
static1
Behavioral task
behavioral1
Sample
59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe
Resource
win10v2004-20220722-en
General
-
Target
59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe
-
Size
2.9MB
-
MD5
2686a3ff73287ad1f874a0a4c2470af5
-
SHA1
73542f96a0cc31e4cf5c7ae94366587a572a2ac3
-
SHA256
59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4
-
SHA512
c69ec47c273724c78839a4ace51e1b0ab1ddfd40eefece23a684328cecc3b9467c6f84b1aee864c326622f8937c81f87e05aed3df113eb070b77e201d3ef93f3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220725131706.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\057815fa-beab-4001-98dd-2cf7e986d053.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 2348 msedge.exe 2348 msedge.exe 4600 identity_helper.exe 4600 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2348 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 81 PID 1980 wrote to memory of 2348 1980 59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe 81 PID 2348 wrote to memory of 2112 2348 msedge.exe 82 PID 2348 wrote to memory of 2112 2348 msedge.exe 82 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3372 2348 msedge.exe 85 PID 2348 wrote to memory of 3104 2348 msedge.exe 86 PID 2348 wrote to memory of 3104 2348 msedge.exe 86 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88 PID 2348 wrote to memory of 1860 2348 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe"C:\Users\Admin\AppData\Local\Temp\59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe"1⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe"C:\Users\Admin\AppData\Local\Temp\59cb5e6e313a1d8ed79c5cadb5c4bad5b3451178a509d2d9fc0d7f7dc6a638e4.exe" /SU1⤵
- Checks computer location settings
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --new-window "http://go.web.de/os/win/edge_runonce"2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffefb3846f8,0x7ffefb384708,0x7ffefb3847183⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:23⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2948 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3164 /prefetch:83⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:13⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:13⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5124 /prefetch:83⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:13⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5720 /prefetch:83⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:13⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:13⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:83⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff628a15460,0x7ff628a15470,0x7ff628a154804⤵PID:1120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2624,17539556993797247737,13453705191281520345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize471B
MD53c0a2f4386177e910df9a2f5d623907f
SHA13853a6e7f1395fe0fbf07d315fe0e10aeebb50ab
SHA25635d18a1c90ebc578afd6db020fecfe219ea5004252d634c7673c6d6d5776d93a
SHA512be8ffa2d541afd895d1c6b72609a972adc9e8ad83f85b6f7667e9457446b98ae67d9fd2d2c37cfb92b6296edd6aa0995451d41dd90b251d7facc34a4cb871af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
Filesize408B
MD5a1fec78a6b17640bb7c5536d613710bf
SHA1e2280105f2ee3349cb9ce75b1ffcba50788f19f2
SHA256f99328cfa6e24b2e61ac98f8559a99053ceb68bb89ebe44399cdd958c878bb31
SHA5122c333cc0ae605452799339068f4bdf34ad8ae9a3b14c22509faebdfb14b3192430a93155778a75a8b34e24927b27d148352b3cbe219776a3dcae86614b49182a