Analysis
-
max time kernel
189s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:38
Static task
static1
Behavioral task
behavioral1
Sample
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe
Resource
win10v2004-20221111-en
General
-
Target
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe
-
Size
284KB
-
MD5
e9f606b91b40aa7cfd2714e06515d50c
-
SHA1
8f547dc6f44ac4652d8a8e819931fd73856ae674
-
SHA256
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41
-
SHA512
5044710eca60fd71dd6a408b43975838b1f5e8839576cb01cf13a44fb6af7a14c5319e13b3b505644a7ad806a51a15fe79ba5c032b1dcb505c1fab08cd405ff0
-
SSDEEP
3072:2gXdZt9P6D3XJ+XcUnTFWoFjGYkOPOZFZ5KuWzsCi3ZhkP+YT6erSvy4rUhwRnl:2e34EMUTYoHkWkFZUuWzA3MWYT+vy4hl
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
Processes:
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exepid process 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msedge.exepid process 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exemsedge.exedescription pid process target process PID 4184 wrote to memory of 4324 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe msedge.exe PID 4184 wrote to memory of 4324 4184 21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe msedge.exe PID 4324 wrote to memory of 4928 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 4928 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1180 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 4468 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 4468 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe PID 4324 wrote to memory of 1212 4324 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe"C:\Users\Admin\AppData\Local\Temp\21a1528a3f1c32e8590f0aad0e6fdd44360efb56c220277a8fb5983790628a41.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.zhendeshihuidaojiale.com/MjFhMTUyOGEzZjFjMzJlODU5MGYwYWFkMGU2ZmRkNDQzNjBlZmI1NmMyMjAyNzdhOGZiNTk4Mzc5MDYyOGE0MS5leGU=/40.html2⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc105546f8,0x7ffc10554708,0x7ffc105547183⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8134584178115839009,4905784499156194755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8134584178115839009,4905784499156194755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8134584178115839009,4905784499156194755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:1212
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f0e3845fefd227d7f1101850410ec849
SHA13067203fafd4237be0c186ddab7029dfcbdfb53e
SHA2567c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554
SHA512584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a
-
Filesize
4KB
MD5f0e3845fefd227d7f1101850410ec849
SHA13067203fafd4237be0c186ddab7029dfcbdfb53e
SHA2567c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554
SHA512584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e