Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 08:37

General

  • Target

    0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96.exe

  • Size

    169KB

  • MD5

    52e9a21da49e31501da2e6408cfa42c0

  • SHA1

    26cf96012ba5bdb626bc65bd223ebafd3940811a

  • SHA256

    0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96

  • SHA512

    07c305d80e63dfbdb0e1998cbabf471efcad7d809609fc18d4c680a03dbae456056cf35af1cdc42997f139970912994a88e48fdbebbefece304a8e6678d54f81

  • SSDEEP

    3072:5gYu3EcVaILaTEDzgMQIEUOSVB3+LcbNSmkpe4J+zS0p:29z2InOSj+uEmU+rp

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96.exe
    "C:\Users\Admin\AppData\Local\Temp\0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4f7146f8,0x7ffe4f714708,0x7ffe4f714718
        3⤵
          PID:1744
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:2
          3⤵
            PID:3584
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4756
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
            3⤵
              PID:4784
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
              3⤵
                PID:1148
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                3⤵
                  PID:3712
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1
                  3⤵
                    PID:3644
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 /prefetch:8
                    3⤵
                      PID:4736
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5696 /prefetch:8
                      3⤵
                        PID:2564
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                        3⤵
                          PID:3952
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:1
                          3⤵
                            PID:1804
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:1
                            3⤵
                              PID:5076
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12005945564215012972,15886308453135362139,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:1
                              3⤵
                                PID:1080
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0479d12c755a9b91b717901c9d179c8d1c18dd860078f7db628e1b99720b2a96.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1568
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4f7146f8,0x7ffe4f714708,0x7ffe4f714718
                                3⤵
                                  PID:4144
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17086385468917889543,16100802879003847633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                  3⤵
                                    PID:644
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17086385468917889543,16100802879003847633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2532
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2504

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Discovery

                                System Information Discovery

                                2
                                T1082

                                Query Registry

                                1
                                T1012

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
                                  Filesize

                                  471B

                                  MD5

                                  32178df3d5b94c8afad292274515b8d2

                                  SHA1

                                  6afe2eb5d4972fde85a21c8222212de9ae3daad9

                                  SHA256

                                  79cd958c8e537f064815a6e8b5a85b63994122018ecdd22670a1f66cc5fd48fa

                                  SHA512

                                  4598303b73f5b13878ea7d06041ed755ec65341f15547c9edb7b9812f1fcef7a48bc5a20d269a7e7da831cc747a1cf2861f6de5db18c6b4e1078b80fb61c01d3

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
                                  Filesize

                                  416B

                                  MD5

                                  a22b97f7f79409fa4481d48eea7093ec

                                  SHA1

                                  3697850acfc110c00bf9e72e4baf4017dc5cdebe

                                  SHA256

                                  1dbe16e4576031db81a37800cc6001caccc044e683c298f7d9545ac6ab360251

                                  SHA512

                                  3bdc34ea42d86622b61bd280a95128c32489502f1cb0512e301b7b036522cc72759ffa5e27be10e923351a5301befc46edf4b9565f594dc543f456a827274a01

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                  Filesize

                                  152B

                                  MD5

                                  727230d7b0f8df1633bc043529f5c15d

                                  SHA1

                                  5b24d959d4c5dcf8125125dbee37225d6160af18

                                  SHA256

                                  54961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998

                                  SHA512

                                  35735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                  Filesize

                                  152B

                                  MD5

                                  7b4b103831d353776ed8bfcc7676f9df

                                  SHA1

                                  40f33a3f791fda49a35224a469cc67b94ca53a23

                                  SHA256

                                  bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85

                                  SHA512

                                  5cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                  Filesize

                                  152B

                                  MD5

                                  7b4b103831d353776ed8bfcc7676f9df

                                  SHA1

                                  40f33a3f791fda49a35224a469cc67b94ca53a23

                                  SHA256

                                  bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85

                                  SHA512

                                  5cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                  Filesize

                                  152B

                                  MD5

                                  7b4b103831d353776ed8bfcc7676f9df

                                  SHA1

                                  40f33a3f791fda49a35224a469cc67b94ca53a23

                                  SHA256

                                  bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85

                                  SHA512

                                  5cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                  Filesize

                                  3KB

                                  MD5

                                  87a51e6e9f4d29e84ef7c9288dfee0e1

                                  SHA1

                                  a12df5fdf0a33ccbae1dd8b5fe804cb5671d3f36

                                  SHA256

                                  5e439936ffffea3d5760921c0ade69ebcf290894e82065973b5c292184d55a59

                                  SHA512

                                  b0e863ef3db3fdb3cf8da6cea6d5647d313afbdec7a48dd94bbffb8811734fa8898609cc11fa75a2b1868b0ab4053d6e94b6de3b62be99899c5dd2d7b7f8a74f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                  Filesize

                                  2KB

                                  MD5

                                  8e26fca2788777375108bfec4dbc8aa6

                                  SHA1

                                  0fb27770a925751b8729cbe56828987c03c4ad16

                                  SHA256

                                  a685b94d488822eb507799f3a99e474161b1b139b1f0e2319cfd04803eb56b42

                                  SHA512

                                  a2bfc78193af3c52ebef1f2daee78d6a59950855ab92b6ad4f4d4b274b6466a3bdbfe40dba4e72b1ef981b41c1848f152de80f58e1468fef355cc105b9e5bdf2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                  Filesize

                                  2KB

                                  MD5

                                  8e26fca2788777375108bfec4dbc8aa6

                                  SHA1

                                  0fb27770a925751b8729cbe56828987c03c4ad16

                                  SHA256

                                  a685b94d488822eb507799f3a99e474161b1b139b1f0e2319cfd04803eb56b42

                                  SHA512

                                  a2bfc78193af3c52ebef1f2daee78d6a59950855ab92b6ad4f4d4b274b6466a3bdbfe40dba4e72b1ef981b41c1848f152de80f58e1468fef355cc105b9e5bdf2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                  Filesize

                                  11KB

                                  MD5

                                  7fed59c56e81dfe11db30cc58a5febd0

                                  SHA1

                                  156a529237e7fbd5cebc69bf424b887044e20def

                                  SHA256

                                  7b33db0932a93a39f1b5d3fa0c067901fee91e363129463eb60558bf61bd6db9

                                  SHA512

                                  d7fef073b3a26c9ac8e504b3848e25473c2feeb6cd85ab6df726b05e21bd7f1ef557938f85c646af477af56fb1792dd7e48070b32a24ff15a000611491d4289e

                                • \??\pipe\LOCAL\crashpad_1568_ENKDLYWHUUYWCOHP
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • \??\pipe\LOCAL\crashpad_2140_AZAATXJTDTAYSRBA
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/644-146-0x0000000000000000-mapping.dmp
                                • memory/1080-168-0x0000000000000000-mapping.dmp
                                • memory/1148-152-0x0000000000000000-mapping.dmp
                                • memory/1568-134-0x0000000000000000-mapping.dmp
                                • memory/1744-133-0x0000000000000000-mapping.dmp
                                • memory/1804-164-0x0000000000000000-mapping.dmp
                                • memory/2140-132-0x0000000000000000-mapping.dmp
                                • memory/2532-147-0x0000000000000000-mapping.dmp
                                • memory/2564-160-0x0000000000000000-mapping.dmp
                                • memory/3584-139-0x0000000000000000-mapping.dmp
                                • memory/3644-156-0x0000000000000000-mapping.dmp
                                • memory/3712-154-0x0000000000000000-mapping.dmp
                                • memory/3952-162-0x0000000000000000-mapping.dmp
                                • memory/4144-135-0x0000000000000000-mapping.dmp
                                • memory/4736-158-0x0000000000000000-mapping.dmp
                                • memory/4756-140-0x0000000000000000-mapping.dmp
                                • memory/4784-142-0x0000000000000000-mapping.dmp
                                • memory/5076-166-0x0000000000000000-mapping.dmp