Analysis
-
max time kernel
171s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 00:45
Behavioral task
behavioral1
Sample
1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe
Resource
win10v2004-20220812-en
General
-
Target
1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe
-
Size
215KB
-
MD5
3b6a39ffe69618a1e59e0e6185eae9f0
-
SHA1
025db9192028565fd45eb67a68707126fa83e88d
-
SHA256
1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c
-
SHA512
03cfff803be4f537dcbb41dbe5b0f4567388d8590bc30209d2f03a365387914a04226aa9efe7de7d57396f3f238a8feab8a2830312ef9c51309ecb0c434c60de
-
SSDEEP
3072:v2HzvOOfwjdbsCOJHMhVDNY4WaNm5sPrGmKMReGRoutNr6+A7:veOOfkbsNBqtWaNm59oRoS4+G
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4524-132-0x0000000000400000-0x00000000005C5000-memory.dmp upx behavioral2/memory/4524-133-0x0000000000400000-0x00000000005C5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4524 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe 4524 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe 4524 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3380 4524 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe 91 PID 4524 wrote to memory of 3380 4524 1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe 91 PID 3380 wrote to memory of 2968 3380 msedge.exe 93 PID 3380 wrote to memory of 2968 3380 msedge.exe 93 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 4840 3380 msedge.exe 94 PID 3380 wrote to memory of 1492 3380 msedge.exe 95 PID 3380 wrote to memory of 1492 3380 msedge.exe 95 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96 PID 3380 wrote to memory of 4232 3380 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe"C:\Users\Admin\AppData\Local\Temp\1ca6d5b2e421c34bbf52f3f3dd7c60a0fc99fc7017a941d57787d4bff8d2a88c.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=10322⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7fffde9c46f8,0x7fffde9c4708,0x7fffde9c47183⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2668 /prefetch:23⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2740 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3172 /prefetch:83⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:13⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:13⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4088 /prefetch:83⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:13⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14966536716791280913,15699855452684112251,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:13⤵PID:3332
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144