Resubmissions

11/10/2022, 17:08

221011-vnmsrafbdn 6

10/10/2022, 15:31

221010-syaj3acdb3 10

09/10/2022, 15:59

221009-tfb6lshbg4 10

09/10/2022, 15:28

221009-swtvxshceq 10

09/10/2022, 13:04

221009-qa2brshab7 10

09/10/2022, 13:03

221009-qaj3gshab6 1

09/10/2022, 12:59

221009-p8jnyahaa6 10

09/10/2022, 12:54

221009-p5m7yshbdm 10

08/10/2022, 21:32

221008-1dxg4afgb8 10

08/10/2022, 13:52

221008-q6p9daegh5 1

Analysis

  • max time kernel
    6s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2022, 13:03

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:1528
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?linkid=2044778
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:508
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xb0,0x104,0x7ff814e446f8,0x7ff814e44708,0x7ff814e44718
        2⤵
          PID:640
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15664794529894236577,16192348001024893180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
          2⤵
            PID:4272
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15664794529894236577,16192348001024893180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
            2⤵
              PID:4736
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?linkid=2044904
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:4624
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0xd4,0x100,0xf8,0x104,0x7ff814e446f8,0x7ff814e44708,0x7ff814e44718
              2⤵
                PID:4268
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
                2⤵
                  PID:1500
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
                  2⤵
                    PID:2252
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                    2⤵
                      PID:3780
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                      2⤵
                        PID:2292
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                        2⤵
                          PID:1000
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:1
                          2⤵
                            PID:4020
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5380 /prefetch:8
                            2⤵
                              PID:5276
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5612 /prefetch:8
                              2⤵
                                PID:5344
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                2⤵
                                  PID:5460
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11402993978760808133,766696160870296737,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                                  2⤵
                                    PID:5500
                                • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                  "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"
                                  1⤵
                                    PID:4816
                                  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"
                                    1⤵
                                      PID:1148
                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\onedrive.exe
                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\onedrive.exe"
                                      1⤵
                                        PID:3980
                                      • C:\Windows\system32\werfault.exe
                                        werfault.exe /h /shared Global\2d2aa1c72c324082b1746ce5aa0f08fc /t 2684 /p 2576
                                        1⤵
                                          PID:3812
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:2248
                                            • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
                                              "PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\Desktop'
                                              2⤵
                                                PID:5424
                                              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"
                                                2⤵
                                                  PID:5528
                                                • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                  "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"
                                                  2⤵
                                                    PID:5592
                                                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"
                                                    2⤵
                                                      PID:5780
                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\onedrive.exe
                                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\onedrive.exe"
                                                      2⤵
                                                        PID:5756
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:3344
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:5492

                                                        Network

                                                        MITRE ATT&CK Matrix

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177

                                                          Filesize

                                                          471B

                                                          MD5

                                                          6b980e7a3b6e5d04ed43ac2d88383f01

                                                          SHA1

                                                          cadbd90d006287ff27e2c47809eaf2d06f3a63e9

                                                          SHA256

                                                          0dbbd3fed100813ed1d0de74b0780f6545eba1e140c8e77ce4e171e4d9c278d9

                                                          SHA512

                                                          5deacb10849eb7541b9c0358429f0b6ab1b3e1c6feb041d77c22b0b265f21b58223347920b7fe3975e8e75d6d55cfbea3f97a52a190e1ada79878c41876d4652

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177

                                                          Filesize

                                                          412B

                                                          MD5

                                                          95741b6efcc551442a5535e6868f99a2

                                                          SHA1

                                                          c42b1b393f3e1d6146464da589a83e27eee45e36

                                                          SHA256

                                                          d58cf1c89a7b1a005be6a80dc7c06aea663e33173d4a58398e69c0895e2c0399

                                                          SHA512

                                                          4af8060fa1d72c639e196b3eb6888f96e826f5a5b6ecb6dea3bc77ab760bf24aaceff579273c792e28d3a4e74902df4dac616052100d00a2bbc1874df924906f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          727230d7b0f8df1633bc043529f5c15d

                                                          SHA1

                                                          5b24d959d4c5dcf8125125dbee37225d6160af18

                                                          SHA256

                                                          54961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998

                                                          SHA512

                                                          35735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          727230d7b0f8df1633bc043529f5c15d

                                                          SHA1

                                                          5b24d959d4c5dcf8125125dbee37225d6160af18

                                                          SHA256

                                                          54961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998

                                                          SHA512

                                                          35735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          7b4b103831d353776ed8bfcc7676f9df

                                                          SHA1

                                                          40f33a3f791fda49a35224a469cc67b94ca53a23

                                                          SHA256

                                                          bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85

                                                          SHA512

                                                          5cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f

                                                        • memory/1148-137-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/1148-139-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/1148-135-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4816-141-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4816-148-0x00007FF7F0330000-0x00007FF7F0340000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4816-146-0x00007FF7F0330000-0x00007FF7F0340000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4816-143-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

                                                          Filesize

                                                          64KB