Analysis
-
max time kernel
176s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe
Resource
win10v2004-20220812-en
General
-
Target
d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe
-
Size
528KB
-
MD5
445378d1969d176bd5c3f89b44276362
-
SHA1
8af0f857fe5db7484a21dba36ac5f6689c58ac84
-
SHA256
d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db
-
SHA512
507b3bb78e2cd5edd34b275f76ecec598e1d3ce1230cb03d77dae51429e301b65558b271a39703faa994d4fb70911468009456185cd24bd13023a532a07ec8eb
-
SSDEEP
6144:Zo2gmzMtvK9x08Opj5XV+1iRkST3H963kbZw6EBRiWcfX:uFmKa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\wmplayer.exe" d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\339ac356-4fe8-4766-8123-9aec1bf00d18.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221021100330.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Download d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2640 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2640 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4768 d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 828 4768 d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe 85 PID 4768 wrote to memory of 828 4768 d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe 85 PID 828 wrote to memory of 4320 828 msedge.exe 86 PID 828 wrote to memory of 4320 828 msedge.exe 86 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 1808 828 msedge.exe 92 PID 828 wrote to memory of 2956 828 msedge.exe 93 PID 828 wrote to memory of 2956 828 msedge.exe 93 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94 PID 828 wrote to memory of 1560 828 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe"C:\Users\Admin\AppData\Local\Temp\d8d18377e6e74d463bf1873be618ccd15b1862fe0a044def4c72cf867979c9db.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=tkFQS92d6gw2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc881f46f8,0x7ffc881f4708,0x7ffc881f47183⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:23⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:13⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:13⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4996 /prefetch:83⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:13⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:13⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5916 /prefetch:83⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:13⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4068 /prefetch:83⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1891735778172547759,13779304326482239916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:83⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xdc,0x114,0x224,0x12c,0x7ff7d5b15460,0x7ff7d5b15470,0x7ff7d5b154804⤵PID:1364
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a8 0x4ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640