Analysis
-
max time kernel
176s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:25
Behavioral task
behavioral1
Sample
f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe
Resource
win10v2004-20221111-en
General
-
Target
f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe
-
Size
664KB
-
MD5
530966d4c27d7dd42648bb6876732970
-
SHA1
8aa2838d7b2e6e9be419dbfab85d264437294534
-
SHA256
f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f
-
SHA512
3db3c63acb9903a1474e0f3df9abdc8363a13b302353607a05d743611d6115b633be1b93714f4789198e7afae39c185ce3e1f4bbc334467783a8d5b68dd00e9f
-
SSDEEP
12288:aBwJctoANC+19Yc+Wsh8dR+zqhLVWUIZDx3LWMcNQVhEmdKKd5+Jc4WoSd:aWJpybr+WF+qvxIZVjJVymwe+2N
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe -
resource yara_rule behavioral2/memory/2052-132-0x0000000018040000-0x000000001821D000-memory.dmp upx behavioral2/memory/2052-133-0x0000000018040000-0x000000001821D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2580 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe 87 PID 2052 wrote to memory of 2580 2052 f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe 87 PID 2580 wrote to memory of 2420 2580 msedge.exe 88 PID 2580 wrote to memory of 2420 2580 msedge.exe 88 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 1448 2580 msedge.exe 89 PID 2580 wrote to memory of 3372 2580 msedge.exe 90 PID 2580 wrote to memory of 3372 2580 msedge.exe 90 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91 PID 2580 wrote to memory of 4908 2580 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe"C:\Users\Admin\AppData\Local\Temp\f0d3df8c8e77584467774290d46682d85bf7ab13ddc9584ff24bc2061726797f.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.027dj.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff949f646f8,0x7ff949f64708,0x7ff949f647183⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:13⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:13⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:13⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:13⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:13⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:13⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 /prefetch:83⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:13⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:13⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6510454439502373472,9798691074929243079,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6520 /prefetch:23⤵PID:4028
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734B
MD5de1cbfe6c3086010af115a1f00909b01
SHA1c75d4c6e53a497c4dc1df1f50bbef08ac625a3d8
SHA256f16c19748cefd356850be752ae3f4d30826ee9391e2d5e13cf628aeb7318b9fd
SHA512d56c78d3718db16a8380296ba5e0bfa68a51635aa21a7dabaa6c6c8cbc2e3456017d1fea71e8cb2fd5c434f5f40d67af76017509e02d331c4f56054a3d57a4b0