Analysis
-
max time kernel
148s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 12:59
Behavioral task
behavioral1
Sample
feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe
Resource
win10v2004-20220812-en
General
-
Target
feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe
-
Size
3.6MB
-
MD5
677c6b71dcc39a74b8cc9945e7c0d3e4
-
SHA1
72854ff519b280d54b2479041a8204743babafc7
-
SHA256
feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080
-
SHA512
3dc718a22f4d200e6635b316053fb4087bc15fd8f3638ecc76d1dfb1fc989ec3801b8cc90f9956698f0aad8ad1320550ef4a6109c6eccea3396ea11631d67235
-
SSDEEP
98304:6dDkSEKVwUiWHEeF3d1cye4hkeqRlRNAsxmChqLBdEJzQ5PPA:6FtWUDpd1cyzj0GsxmKqLB8z
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4328-132-0x0000000000400000-0x0000000000CDF000-memory.dmp vmprotect behavioral2/memory/4328-133-0x0000000000400000-0x0000000000CDF000-memory.dmp vmprotect behavioral2/memory/4328-136-0x0000000000400000-0x0000000000CDF000-memory.dmp vmprotect behavioral2/memory/4328-139-0x0000000000400000-0x0000000000CDF000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 4712 msedge.exe 4712 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3296 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 84 PID 4328 wrote to memory of 3296 4328 feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe 84 PID 3296 wrote to memory of 2684 3296 msedge.exe 85 PID 3296 wrote to memory of 2684 3296 msedge.exe 85 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 3860 3296 msedge.exe 88 PID 3296 wrote to memory of 4712 3296 msedge.exe 90 PID 3296 wrote to memory of 4712 3296 msedge.exe 90 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89 PID 3296 wrote to memory of 4596 3296 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe"C:\Users\Admin\AppData\Local\Temp\feec2771de44c417fcfc0cc6c2bff64e48049bac5f6d712d6bdb61a885e67080.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cfdami.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99e3a46f8,0x7ff99e3a4708,0x7ff99e3a47183⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 /prefetch:23⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:83⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2608 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:13⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:13⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2160,10258985061999797132,15150244275271362199,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:3364
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716