Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:05
Static task
static1
Behavioral task
behavioral1
Sample
d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe
Resource
win10v2004-20221111-en
General
-
Target
d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe
-
Size
309KB
-
MD5
192b98651d71c5fb021ad218a4473571
-
SHA1
4a8c0889f2f725b747db63583e65222c90b883d8
-
SHA256
d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed
-
SHA512
78a7194dd888780e9b72a404217e79b592f26163576bf560309479331d1460c0fbbaacc01cd3ef99859f9a3b7970debc620162724f8a3c129a5f954cef8e68cc
-
SSDEEP
6144:da53G748znG0jAA2g2TW/OyqVY2RDg+HtOd0yE:053zALkAtqVdRE6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msedge.exepid process 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msedge.exepid process 3512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exemsedge.exedescription pid process target process PID 2536 wrote to memory of 3512 2536 d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe msedge.exe PID 2536 wrote to memory of 3512 2536 d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe msedge.exe PID 3512 wrote to memory of 4072 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4072 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2168 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 5092 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 5092 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 4688 3512 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe"C:\Users\Admin\AppData\Local\Temp\d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://best-hack.ru/load/warface_rossija/122⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ff8ce6746f8,0x7ff8ce674708,0x7ff8ce6747183⤵PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16199423025513543296,17241636278723395953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:2168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16199423025513543296,17241636278723395953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16199423025513543296,17241636278723395953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:83⤵PID:4688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16199423025513543296,17241636278723395953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16199423025513543296,17241636278723395953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e