Analysis
-
max time kernel
171s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe
Resource
win10v2004-20220812-en
General
-
Target
e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe
-
Size
42KB
-
MD5
547e0a5356b2c0c5973fe05399671d90
-
SHA1
94f27dcf06c112cbac29b03c8c87c06da8e92e8a
-
SHA256
e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b
-
SHA512
cf9b02293a25260c259690568e542cdd02fada012336f3695ad9ea8a5c5ec8c98ad8dd20892baadb4ad3a745efb04d4b75eae63ed120a53b7c642d7a8c4bce6f
-
SSDEEP
768:AknYgtFvqTOYq8ow+F0gJZzA+gNVM2oqfauWKCm:AkoxNoT5A+n2dCPKCm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 388 msedge.exe 388 msedge.exe 4524 msedge.exe 4524 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3176 4696 e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe 84 PID 4696 wrote to memory of 3176 4696 e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe 84 PID 3176 wrote to memory of 548 3176 msedge.exe 85 PID 3176 wrote to memory of 548 3176 msedge.exe 85 PID 4696 wrote to memory of 3544 4696 e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe 86 PID 4696 wrote to memory of 3544 4696 e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe 86 PID 3544 wrote to memory of 3388 3544 msedge.exe 87 PID 3544 wrote to memory of 3388 3544 msedge.exe 87 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 1084 3544 msedge.exe 90 PID 3544 wrote to memory of 388 3544 msedge.exe 91 PID 3544 wrote to memory of 388 3544 msedge.exe 91 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92 PID 3176 wrote to memory of 4584 3176 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe"C:\Users\Admin\AppData\Local\Temp\e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe1db946f8,0x7ffe1db94708,0x7ffe1db947183⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2400 /prefetch:23⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:83⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:13⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:13⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:13⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:13⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:13⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,338770454005104515,17884735397146187961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3844 /prefetch:83⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵PID:3616
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff6f6395460,0x7ff6f6395470,0x7ff6f63954804⤵PID:3856
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e5bdb070960357eaab56367e7c56f3280d1911b29b683448717620450adb416b.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe1db946f8,0x7ffe1db94708,0x7ffe1db947183⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5352472723573265787,13551759345890891904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:23⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5352472723573265787,13551759345890891904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD56023774869fb68a520fa8a81eac74813
SHA19efacffb8430ac402698944cb030a488d4a9bb0d
SHA256b5f5303a669fed7b98beaf9d785e84b10c8f857395cf26aa6eecbaf192163407
SHA512744f592160b79a102837ee18f7018f00e80f8b8d71fca4469b15d212803920ef2b2e523b2b38d92df430fd8ff95a853bc3d519a2d8f95d11de4852e6d99f6dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD59c46205c12da6af92529db6f63e48f05
SHA1e35aab6910959620af725c1785ac9eda1e4db3aa
SHA256205d53df080477fe1018ff78654fa4bddd75967bebed10562724c6f063199751
SHA5128bed09b9c95f279a4ccc23fa84bf344132739cde3df8b188550f122aa7fd407383e063384eb0e28db862f938ccab02ea5af1231191d8e93efcecbcf385fbba50
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
2KB
MD5e2fe07881461d1eb72511e97bbe0f0d0
SHA19c32aa23691019b4b4205d015ae30c105fd5f399
SHA256ebc8b76ebb9ca0f1c9310b35663ecc5b0b84d8a7d36c43b13bf055a138e68b68
SHA5120d71046b51b3f61d7e3424bdb31486c4d7020144534e38356fcdfa36647a24c63f50c524411fa4afd7ca6aa4654e8ad949f1278cc530571487f6c1f80fead5f3