Analysis
-
max time kernel
206s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe
Resource
win10v2004-20221111-en
General
-
Target
4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe
-
Size
100KB
-
MD5
451bb45c83fae0ee6dd2e5c4f5c44e8f
-
SHA1
2ec8d1a84c764f1063aa9096b14dd3d779a984a6
-
SHA256
4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c
-
SHA512
517ea3eeb3277842225aa3154efa4b25266de42c64e69f6974af339211ca8a9098c606cd29a994e83e3cabc8c03126c330dfb912cd48ca0d7d40416745c4c088
-
SSDEEP
1536:IV3TQavNCtfFCAPS6AF652REjrsyUXJfu29+LMgNbigVXjgXRyWeBI0QVrlqjRQ1:sMEyba6AcSsbYoEGG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1280 4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 456 1280 4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe 85 PID 1280 wrote to memory of 456 1280 4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe 85 PID 1280 wrote to memory of 456 1280 4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe 85 PID 3784 wrote to memory of 4880 3784 explorer.exe 87 PID 3784 wrote to memory of 4880 3784 explorer.exe 87 PID 4880 wrote to memory of 4956 4880 msedge.exe 89 PID 4880 wrote to memory of 4956 4880 msedge.exe 89 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 3120 4880 msedge.exe 92 PID 4880 wrote to memory of 2436 4880 msedge.exe 93 PID 4880 wrote to memory of 2436 4880 msedge.exe 93 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95 PID 4880 wrote to memory of 2904 4880 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe"C:\Users\Admin\AppData\Local\Temp\4f52f6d7b06d6bbc0b9dd295075e848637f6ff7c94c70e94ed3d8148da19f11c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=2"2⤵PID:456
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=22⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff9d4d946f8,0x7ff9d4d94708,0x7ff9d4d947183⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3028 /prefetch:83⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:13⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:13⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 /prefetch:83⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:13⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5992 /prefetch:83⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:13⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7565196516391347301,5659563265511300915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6644 /prefetch:83⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵PID:5080
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288