Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 02:50
Static task
static1
Behavioral task
behavioral1
Sample
791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe
Resource
win10v2004-20220812-en
General
-
Target
791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe
-
Size
18KB
-
MD5
9eadf7f4b39bb189b8025eacb883fa78
-
SHA1
5708d5c2e9fc4adc3bb5c0dfaf53785b0708face
-
SHA256
791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7
-
SHA512
bbd46731e00555163f13cf6997038aaab7b7fa8ed9ffe95a22f0511c26758b8852ab694a8ff8e84a6fdf1b2bbc59b96730068b621804cabb67d84aa3e1d1f6a6
-
SSDEEP
384:yp8GQKhqticjYNhNoT84bCecusshb1vcWLr2amWvWUEzB1My/:nwhqticooZjcusshBLr2afEt1b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 PHIME2OO2A.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PHIME2OO2A.EXE = "C:\\Windows\\system\\PHIME2OO2A.EXE" PHIME2OO2A.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\N0TEPAD.EXE PHIME2OO2A.EXE File opened for modification C:\Windows\SysWOW64\N0TEPAD.EXE PHIME2OO2A.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\9030a457-32e4-45d2-aadd-ecfcc78ebf1c.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919060220.pma setup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system\N0TEPAD.EXE PHIME2OO2A.EXE File created C:\Windows\N0TEPAD.EXE PHIME2OO2A.EXE File opened for modification C:\Windows\N0TEPAD.EXE PHIME2OO2A.EXE File opened for modification C:\Windows\system\windll.dll PHIME2OO2A.EXE File created C:\Windows\system\PHIME2OO2A.EXE 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe File opened for modification C:\Windows\system\PHIME2OO2A.EXE 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe File created C:\Windows\system\N0TEPAD.EXE PHIME2OO2A.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "about:blank" PHIME2OO2A.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "N0TEPAD.EXE %1" PHIME2OO2A.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 2248 msedge.exe 2248 msedge.exe 1392 identity_helper.exe 1392 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 PHIME2OO2A.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 2216 PHIME2OO2A.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2248 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 79 PID 1192 wrote to memory of 2248 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 79 PID 2248 wrote to memory of 3424 2248 msedge.exe 80 PID 2248 wrote to memory of 3424 2248 msedge.exe 80 PID 1192 wrote to memory of 2216 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 81 PID 1192 wrote to memory of 2216 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 81 PID 1192 wrote to memory of 2216 1192 791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe 81 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 4308 2248 msedge.exe 84 PID 2248 wrote to memory of 1620 2248 msedge.exe 85 PID 2248 wrote to memory of 1620 2248 msedge.exe 85 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86 PID 2248 wrote to memory of 4284 2248 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe"C:\Users\Admin\AppData\Local\Temp\791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.18hi.net/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff3e1a46f8,0x7fff3e1a4708,0x7fff3e1a47183⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:23⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:13⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:13⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5300 /prefetch:83⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:13⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:13⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:13⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6764 /prefetch:83⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x224,0x228,0x22c,0x220,0x230,0x7ff7e91d5460,0x7ff7e91d5470,0x7ff7e91d54804⤵PID:3624
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6764 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6392 /prefetch:83⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9150352238390961657,14933226335192457006,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5372 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
-
C:\Windows\system\PHIME2OO2A.EXE"C:\Windows\system\PHIME2OO2A.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD59eadf7f4b39bb189b8025eacb883fa78
SHA15708d5c2e9fc4adc3bb5c0dfaf53785b0708face
SHA256791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7
SHA512bbd46731e00555163f13cf6997038aaab7b7fa8ed9ffe95a22f0511c26758b8852ab694a8ff8e84a6fdf1b2bbc59b96730068b621804cabb67d84aa3e1d1f6a6
-
Filesize
18KB
MD59eadf7f4b39bb189b8025eacb883fa78
SHA15708d5c2e9fc4adc3bb5c0dfaf53785b0708face
SHA256791f85acd61443d522c32d8c21e3f447dfcfb50a60ebce3cf026b409df8222a7
SHA512bbd46731e00555163f13cf6997038aaab7b7fa8ed9ffe95a22f0511c26758b8852ab694a8ff8e84a6fdf1b2bbc59b96730068b621804cabb67d84aa3e1d1f6a6