Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:03

General

  • Target

    48d537c6507f946739441e6b49766bbaadac206f1ca6d6d5ea9fe8ef2c3aca5b.exe

  • Size

    168KB

  • MD5

    da8bf2cd7c69b6bf5550f671840aa9f0

  • SHA1

    e4b24e57b05b765f7a56b5a0e02abaaa78fd78e1

  • SHA256

    48d537c6507f946739441e6b49766bbaadac206f1ca6d6d5ea9fe8ef2c3aca5b

  • SHA512

    530f87085aeefe63c270b545bb3b05817212d2982c51c9c7f5408d9e27a9551474e794cee283d63fe568d0da912e85d6b5512c08749aea52817a20f3bccab04c

  • SSDEEP

    3072:n3c1fP4AJJ6ceQdUmLaS1VUnt63hic1PksncUtV65ooISMzvv3WV4fBmXwI3QMEV:3OPj2adUJ6VGsiIPkQRmuvWAyY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 19 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48d537c6507f946739441e6b49766bbaadac206f1ca6d6d5ea9fe8ef2c3aca5b.exe
    "C:\Users\Admin\AppData\Local\Temp\48d537c6507f946739441e6b49766bbaadac206f1ca6d6d5ea9fe8ef2c3aca5b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://k.shuianshanba.com/48d537c6507f946739441e6b49766bbaadac206f1ca6d6d5ea9fe8ef2c3aca5b.exe/sohu.jpg
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe1c8c46f8,0x7ffe1c8c4708,0x7ffe1c8c4718
        3⤵
          PID:1800
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10789023514410950889,3395175502943262110,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
          3⤵
            PID:1984
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10789023514410950889,3395175502943262110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3836
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10789023514410950889,3395175502943262110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
            3⤵
              PID:4964
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10789023514410950889,3395175502943262110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              3⤵
                PID:956
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10789023514410950889,3395175502943262110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                3⤵
                  PID:3380
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:2260

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Discovery

              System Information Discovery

              2
              T1082

              Query Registry

              1
              T1012

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Base64.dll
                Filesize

                4KB

                MD5

                f0e3845fefd227d7f1101850410ec849

                SHA1

                3067203fafd4237be0c186ddab7029dfcbdfb53e

                SHA256

                7c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554

                SHA512

                584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Base64.dll
                Filesize

                4KB

                MD5

                f0e3845fefd227d7f1101850410ec849

                SHA1

                3067203fafd4237be0c186ddab7029dfcbdfb53e

                SHA256

                7c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554

                SHA512

                584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\Inetc.dll
                Filesize

                20KB

                MD5

                50fdadda3e993688401f6f1108fabdb4

                SHA1

                04a9ae55d0fb726be49809582cea41d75bf22a9a

                SHA256

                6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                SHA512

                e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\System.dll
                Filesize

                11KB

                MD5

                00a0194c20ee912257df53bfe258ee4a

                SHA1

                d7b4e319bc5119024690dc8230b9cc919b1b86b2

                SHA256

                dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

                SHA512

                3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\nsProcess.dll
                Filesize

                4KB

                MD5

                05450face243b3a7472407b999b03a72

                SHA1

                ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

                SHA256

                95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

                SHA512

                f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

              • C:\Users\Admin\AppData\Local\Temp\nsvD70D.tmp\nsProcess.dll
                Filesize

                4KB

                MD5

                05450face243b3a7472407b999b03a72

                SHA1

                ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

                SHA256

                95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

                SHA512

                f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

              • \??\pipe\LOCAL\crashpad_3300_OLRSSXYVDUKCKHKK
                MD5

                d41d8cd98f00b204e9800998ecf8427e

                SHA1

                da39a3ee5e6b4b0d3255bfef95601890afd80709

                SHA256

                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                SHA512

                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

              • memory/764-135-0x0000000003751000-0x0000000003754000-memory.dmp
                Filesize

                12KB

              • memory/764-152-0x00000000001D1000-0x00000000001D4000-memory.dmp
                Filesize

                12KB

              • memory/764-142-0x0000000004221000-0x0000000004224000-memory.dmp
                Filesize

                12KB

              • memory/764-145-0x00000000001C1000-0x00000000001C4000-memory.dmp
                Filesize

                12KB

              • memory/956-167-0x0000000000000000-mapping.dmp
              • memory/1800-156-0x0000000000000000-mapping.dmp
              • memory/1984-161-0x0000000000000000-mapping.dmp
              • memory/3300-149-0x0000000000000000-mapping.dmp
              • memory/3380-169-0x0000000000000000-mapping.dmp
              • memory/3836-162-0x0000000000000000-mapping.dmp
              • memory/4964-164-0x0000000000000000-mapping.dmp