Analysis

  • max time kernel
    187s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 10:15

General

  • Target

    14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b.exe

  • Size

    51KB

  • MD5

    a62c8432b4e9c6d98fbaf4699f53bfb5

  • SHA1

    7e7ffa3a9aa588f888f11ca8f382c0ef0b758dbd

  • SHA256

    14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b

  • SHA512

    768880c7ce1608263422ff24223b7894385dc4b7bdae1a42ec714afbd89018da87f40696f93c799596206484024ac89cadc332c38c8ca98674917c860b704551

  • SSDEEP

    1536:LeY1g9rHUUisKldRC+8U+HAnnS2ESeyxYQtwPC5LtisKldR:CIg9ohVJMIHxJa4LaV

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b.exe
    "C:\Users\Admin\AppData\Local\Temp\14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffd3bcb46f8,0x7ffd3bcb4708,0x7ffd3bcb4718
        3⤵
          PID:840
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12753385882934960259,17845315792398795058,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
          3⤵
            PID:3280
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12753385882934960259,17845315792398795058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3684
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=14ab18c343c45291ff559104e6a12121045341b3bb698e7ab3195686153e991b.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
          2⤵
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4796
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd3bcb46f8,0x7ffd3bcb4708,0x7ffd3bcb4718
            3⤵
              PID:1588
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
              3⤵
                PID:4744
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3028
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
                3⤵
                  PID:3204
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                  3⤵
                    PID:4192
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                    3⤵
                      PID:2732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                      3⤵
                        PID:2404
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                        3⤵
                          PID:5056
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                          3⤵
                            PID:4884
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6512 /prefetch:8
                            3⤵
                              PID:620
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:1
                              3⤵
                                PID:3148
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:1
                                3⤵
                                  PID:3688
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,15585582883361548338,3485182799536060784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3776 /prefetch:8
                                  3⤵
                                    PID:3144
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3688

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE

                                  Filesize

                                  471B

                                  MD5

                                  d8605533587058a9394d0c1f6228f808

                                  SHA1

                                  05d55218be3e8be27f6c3beb4bde642046cbaa64

                                  SHA256

                                  9a2952b7e318385b2f9bb3a653e5ada207fa93d812f4fe014c01f92b45cc9e03

                                  SHA512

                                  3f91cee3f69beb0137260694de2e5aa3f4fa63ce23f3eb24d920cdf0910ace3bb645373d41c3101951eca1d4f14c18e2c0ff9fee24da4cc5bf7616583e886eb2

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE

                                  Filesize

                                  446B

                                  MD5

                                  a951db916d45d3c37b3b65a3e7767acc

                                  SHA1

                                  e1c1383bba140e800cce6a80b0f16c0319a91c7e

                                  SHA256

                                  971beb45d4110472c7ddd253c33cbebae84b01e275e65a296b2795d0af1cec9b

                                  SHA512

                                  0b64113deb0a39ffb70481e636ad52e3113cd2dedf85b43bbd32ea43a60ff472eaf2840ac35779d400932663c303f9bcdb9345f32539b650437ca04f90c5d104

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  a58a7931227f93b9a54bc982c0d99582

                                  SHA1

                                  7591b129f025f2003039a81830b9cd5d7043d3e2

                                  SHA256

                                  a6751ef5a8d88960e0fc22e205155f766e840d13c46c962166f35e3bf8367ac0

                                  SHA512

                                  24eec66ba6b79cebb2b920cdad34f9b68fcc9503a2e4bc718ddf3d39b8f959ee1c7b0e73079b31a0e8acc98960fcedeb7e49f38b8f5036aa21294048f7f1a79b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  a58a7931227f93b9a54bc982c0d99582

                                  SHA1

                                  7591b129f025f2003039a81830b9cd5d7043d3e2

                                  SHA256

                                  a6751ef5a8d88960e0fc22e205155f766e840d13c46c962166f35e3bf8367ac0

                                  SHA512

                                  24eec66ba6b79cebb2b920cdad34f9b68fcc9503a2e4bc718ddf3d39b8f959ee1c7b0e73079b31a0e8acc98960fcedeb7e49f38b8f5036aa21294048f7f1a79b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6102471af38b45f30decc8db2f59a8e2

                                  SHA1

                                  35428c52f58b3a35d5028929b6298d6b95d6bdec

                                  SHA256

                                  57e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4

                                  SHA512

                                  1040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6102471af38b45f30decc8db2f59a8e2

                                  SHA1

                                  35428c52f58b3a35d5028929b6298d6b95d6bdec

                                  SHA256

                                  57e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4

                                  SHA512

                                  1040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6102471af38b45f30decc8db2f59a8e2

                                  SHA1

                                  35428c52f58b3a35d5028929b6298d6b95d6bdec

                                  SHA256

                                  57e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4

                                  SHA512

                                  1040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  2KB

                                  MD5

                                  78ea43d8b4eb8a9a2a97e1373761de1e

                                  SHA1

                                  16050914deaa18b334edf3f9ecd4a666e05e5ed4

                                  SHA256

                                  f159488f97661415e0b813a5f0dd5974b14ff6014256ffc19ba07ac503c855a1

                                  SHA512

                                  05fb28576b8d519055af3197db624a56420b99e903bb43e0db1c7433040cd9a75d270cde13bf13d846eb184aee62173d80c1ac562bb3ee988acb53936694d839

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  2KB

                                  MD5

                                  78ea43d8b4eb8a9a2a97e1373761de1e

                                  SHA1

                                  16050914deaa18b334edf3f9ecd4a666e05e5ed4

                                  SHA256

                                  f159488f97661415e0b813a5f0dd5974b14ff6014256ffc19ba07ac503c855a1

                                  SHA512

                                  05fb28576b8d519055af3197db624a56420b99e903bb43e0db1c7433040cd9a75d270cde13bf13d846eb184aee62173d80c1ac562bb3ee988acb53936694d839

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  3KB

                                  MD5

                                  7bac99431999e910fccefb7fb303deee

                                  SHA1

                                  3696f9ffb0132c8228ba4f7578969721f49c0d83

                                  SHA256

                                  f30cfd239a28b3c538b8a3f2ae7908b55a49be85a38fd0568f95cd183a54b171

                                  SHA512

                                  56551d1d5b6b544108aed1a37787e7b79b993157aa0a8010fdff77e8646b553e5128a4871d676a38f3886f1785ae504233d60570fb3611bdac7e068677e22051

                                • \??\pipe\LOCAL\crashpad_1476_XSHLNKIKONOTDKWM

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • \??\pipe\LOCAL\crashpad_4796_FRLWAVYBEQHUKFKP

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/620-167-0x0000000000000000-mapping.dmp

                                • memory/840-133-0x0000000000000000-mapping.dmp

                                • memory/1476-132-0x0000000000000000-mapping.dmp

                                • memory/1588-135-0x0000000000000000-mapping.dmp

                                • memory/2404-156-0x0000000000000000-mapping.dmp

                                • memory/2732-154-0x0000000000000000-mapping.dmp

                                • memory/3028-144-0x0000000000000000-mapping.dmp

                                • memory/3148-169-0x0000000000000000-mapping.dmp

                                • memory/3204-149-0x0000000000000000-mapping.dmp

                                • memory/3280-143-0x0000000000000000-mapping.dmp

                                • memory/3684-145-0x0000000000000000-mapping.dmp

                                • memory/3688-171-0x0000000000000000-mapping.dmp

                                • memory/4192-152-0x0000000000000000-mapping.dmp

                                • memory/4744-142-0x0000000000000000-mapping.dmp

                                • memory/4796-134-0x0000000000000000-mapping.dmp

                                • memory/4884-162-0x0000000000000000-mapping.dmp

                                • memory/5056-160-0x0000000000000000-mapping.dmp