Analysis
-
max time kernel
188s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 03:46
Behavioral task
behavioral1
Sample
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
Resource
win10v2004-20220812-en
General
-
Target
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
-
Size
2.2MB
-
MD5
8b0f3f1c2a1fc87da08710797a1c39c5
-
SHA1
c583ab8a7f693339c8030ac04d1b0e78568ded7e
-
SHA256
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3
-
SHA512
12c3f69740a6dfd626afef90160e56f61993fd74e74088a735bf55cda3e43ca7ac6df30f44a64e983b797e8f57c3d83e5652e38c3dfa2904f0d783a32eb2edb9
-
SSDEEP
49152:1+OqalWMb/c2NwvgT8ip0arWP4Dr7pwxUy6nHk+84I:1+WUMb/c2+vgx0arWP0r7pwEnHk+jI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4056-132-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral2/memory/4056-133-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral2/memory/4056-135-0x0000000000400000-0x000000000083C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4360 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 80 PID 4056 wrote to memory of 4360 4056 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 80 PID 4360 wrote to memory of 2304 4360 msedge.exe 81 PID 4360 wrote to memory of 2304 4360 msedge.exe 81 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3940 4360 msedge.exe 82 PID 4360 wrote to memory of 3788 4360 msedge.exe 83 PID 4360 wrote to memory of 3788 4360 msedge.exe 83 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86 PID 4360 wrote to memory of 4664 4360 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe"C:\Users\Admin\AppData\Local\Temp\8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.jjkkba.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xb0,0x104,0x7ff8587b46f8,0x7ff8587b4708,0x7ff8587b47183⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:83⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:13⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5204 /prefetch:83⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:13⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1896 /prefetch:83⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1724 /prefetch:13⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13343812396193602887,16368962269849721832,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:13⤵PID:3268
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904