Analysis
-
max time kernel
196s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe
Resource
win10v2004-20221111-en
General
-
Target
41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe
-
Size
141KB
-
MD5
316f41c12c008e77f862e23ca24d1030
-
SHA1
8ce9ed7369c573ca7af4c51ed112997506f970a5
-
SHA256
41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0
-
SHA512
4d6a9ad38150d9f1acf2897177342a8b8aee689dead3601d95da3cd74b8ee77a0957f4e169a489a3cdb10202e108785af2186ecf0728f64dbaf370578cb24013
-
SSDEEP
3072:i7k1qIDapTbpSY4ESneJOLL2jO6Sd4tvERUJOsqzmFw/jkhA2j:MIuxbJ4202jlSd4yRUV+mFekF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 116 3452 WerFault.exe 80 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Download 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4700 3452 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe 89 PID 3452 wrote to memory of 4700 3452 41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe 89 PID 4700 wrote to memory of 3612 4700 msedge.exe 90 PID 4700 wrote to memory of 3612 4700 msedge.exe 90 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 5084 4700 msedge.exe 98 PID 4700 wrote to memory of 4204 4700 msedge.exe 99 PID 4700 wrote to memory of 4204 4700 msedge.exe 99 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100 PID 4700 wrote to memory of 4428 4700 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe"C:\Users\Admin\AppData\Local\Temp\41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 3882⤵
- Program crash
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffc99ed46f8,0x7ffc99ed4708,0x7ffc99ed47183⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:83⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:13⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:13⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 /prefetch:83⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16426035377721080389,7603075888033070692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:4904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3452 -ip 34521⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484