Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe
Resource
win10v2004-20220812-en
General
-
Target
161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe
-
Size
500KB
-
MD5
20fcd20ba9253694dab1577768ac6ca0
-
SHA1
82ea97856877ba57bcadbe57ff1fde169925fc1e
-
SHA256
161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040
-
SHA512
80e6f5a18d56e981ad135025d882588cc6b7e5323ecbf17d05b73dd53abac3e624a8e3c9134b212e0b9f28481b5a4f620962513de17e7cdc3dd4097c33c64019
-
SSDEEP
6144:lw2EI9rdJKZGvwMegUDPU7cIj2ex+2LQKHK:lwkPx+2L
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\88bf245e-0520-489b-9b5d-722c48153e24.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221012004443.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 2736 msedge.exe 2736 msedge.exe 456 msedge.exe 456 msedge.exe 4440 identity_helper.exe 4440 identity_helper.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3352 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3352 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 456 msedge.exe 456 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 456 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 81 PID 2244 wrote to memory of 456 2244 161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe 81 PID 456 wrote to memory of 548 456 msedge.exe 82 PID 456 wrote to memory of 548 456 msedge.exe 82 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 4924 456 msedge.exe 85 PID 456 wrote to memory of 2736 456 msedge.exe 86 PID 456 wrote to memory of 2736 456 msedge.exe 86 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87 PID 456 wrote to memory of 4884 456 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe"C:\Users\Admin\AppData\Local\Temp\161f43d1be9396c84ba47654921864272015cbb9807786a5b6a3e6a194051040.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=xIxBiVwDdxE&feature=player_embedded2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3b3846f8,0x7fff3b384708,0x7fff3b3847183⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:23⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4956 /prefetch:83⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:13⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:13⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5752 /prefetch:83⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:13⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:13⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7052 /prefetch:83⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff646845460,0x7ff646845470,0x7ff6468454804⤵PID:3436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7052 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4240 /prefetch:83⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,791009600392311061,15735676493832913356,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x45c 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352