Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 05:06
Behavioral task
behavioral1
Sample
de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe
Resource
win10v2004-20220901-en
General
-
Target
de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe
-
Size
195KB
-
MD5
a3672a01d73ffadb40c4812dde3165fb
-
SHA1
28b32d69587ba98bb11aee9918db86ed76d4f9f7
-
SHA256
de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464
-
SHA512
8a9cd33eea7a338fefc2cacd56a74bc67918abf87924b537c724806c6f22f048f5020ba00829eea1d39b13e8d1188deeabf4ed849f52edccabbde1e44dbc727a
-
SSDEEP
3072:yehTtZ9kkPehMLodvXzneVjiRGms+fu/37MbQ7BJNwWSQ8gX06kpT6jQZ:XVfzehFvXznekmf7R7BJeWSQZ0Rsjw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4740-132-0x0000000000400000-0x0000000000569000-memory.dmp upx behavioral2/memory/4740-133-0x0000000000400000-0x0000000000569000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6901045b-2e9b-4493-aad5-140f51ada1ea.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220901113452.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 804 msedge.exe 804 msedge.exe 4648 identity_helper.exe 4648 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4740 de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe 4740 de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe 4740 de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 804 4740 de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe 89 PID 4740 wrote to memory of 804 4740 de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe 89 PID 804 wrote to memory of 4048 804 msedge.exe 90 PID 804 wrote to memory of 4048 804 msedge.exe 90 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 384 804 msedge.exe 91 PID 804 wrote to memory of 3728 804 msedge.exe 92 PID 804 wrote to memory of 3728 804 msedge.exe 92 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94 PID 804 wrote to memory of 1300 804 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe"C:\Users\Admin\AppData\Local\Temp\de84a8898ad6b6d695c690a4c7c990fe80c5bb9c52466ef785dd999493e77464.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=4982⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc48b846f8,0x7ffc48b84708,0x7ffc48b847183⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3096 /prefetch:83⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:13⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:13⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:13⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:83⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff6525c5460,0x7ff6525c5470,0x7ff6525c54804⤵PID:1620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:13⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:13⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:13⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2364 /prefetch:13⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1052529436577018915,13907653382861053303,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152