Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe
Resource
win10v2004-20220812-en
General
-
Target
548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe
-
Size
103KB
-
MD5
a1ba5dea6274aee54cf96ddb5fa97ba9
-
SHA1
2cb5d67d10850aff4d9fcfca55dd81b74e79cb23
-
SHA256
548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7
-
SHA512
5cff394a39e97b85ab3b50dbf9bd65b0c04bb61960cd8cfe91f07089e9095a174b820e9ba27fb2f5a68f5da8b6154b496badfae32f56269f8a8917db4035dcd3
-
SSDEEP
3072:hj5xNRXRkczNUoLc0/Y4qPrd6T9lxPqQ:bxRkczu1XtPx6vxy
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\219323ca-ee9e-4aec-a499-6a5bc3534d4b.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221019143150.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 4688 msedge.exe 4688 msedge.exe 3460 identity_helper.exe 3460 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4688 4240 548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe 82 PID 4240 wrote to memory of 4688 4240 548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe 82 PID 4688 wrote to memory of 1436 4688 msedge.exe 83 PID 4688 wrote to memory of 1436 4688 msedge.exe 83 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3540 4688 msedge.exe 86 PID 4688 wrote to memory of 3900 4688 msedge.exe 87 PID 4688 wrote to memory of 3900 4688 msedge.exe 87 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89 PID 4688 wrote to memory of 1756 4688 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe"C:\Users\Admin\AppData\Local\Temp\548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd4,0xfc,0x100,0xd8,0x104,0x7ffe36ae46f8,0x7ffe36ae4708,0x7ffe36ae47183⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:83⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:13⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:13⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5316 /prefetch:83⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4120 /prefetch:83⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:13⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:13⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:13⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:13⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:83⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1152 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6aa605460,0x7ff6aa605470,0x7ff6aa6054804⤵PID:2096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14587027359009894848,15993534340384869197,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2880 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:4036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe36ae46f8,0x7ffe36ae4708,0x7ffe36ae47183⤵PID:1868
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58be9513fd38b94d4f6b5011b68b60326
SHA147feef421fe8de09e36ca685e9cf19d404aa8917
SHA2565bf3203e8be948e62917ebab13e1b21aec105c473089b233874fac8e5748bb2d
SHA512cb3dbfa46f3ee28956deab38fefa8276f9efa6ea978ff6b7f810f7f9ba106ed569f017cf5c840ae90fc5f83a1e6dbe50efef8e3412f4f38452a00915b2cc58bc