Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe
Resource
win10v2004-20220812-en
General
-
Target
6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe
-
Size
265KB
-
MD5
37dbf88a3594a4fc1f389b899755470e
-
SHA1
bf45efb4a214f817a306e0d8200099e3386597fd
-
SHA256
6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b
-
SHA512
11b2f6a731780a7213f6ed735d70625c67aa3023d4b352d3c162d66365678856af41325ca39e6c761e0e0fbbfca0ae0d7cc76e370733870b956132bd7445dec2
-
SSDEEP
3072:55BuYAVrgUCPnaUMHZP/JdYCC2/WwSTa8sfuCMlltJ/Amm8totmuSy5q8xBCHUL:550gUC7ad42/WwBuC+tJ/lm7Z5lL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4100 Dragon Pals.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Dragon Pals\Dragon Pals.exe 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe File opened for modification C:\Program Files (x86)\Dragon Pals\Dragon Pals.exe 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe File created C:\Program Files (x86)\Dragon Pals\Uninstall.exe 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe File opened for modification C:\Program Files (x86)\Dragon Pals\Uninstall.exe 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e8f0bf9f-fef6-4101-b483-d21cc9adf323.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221128222330.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2832 msedge.exe 2832 msedge.exe 3312 msedge.exe 3312 msedge.exe 4544 identity_helper.exe 4544 identity_helper.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4100 4804 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe 81 PID 4804 wrote to memory of 4100 4804 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe 81 PID 4804 wrote to memory of 4100 4804 6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe 81 PID 4100 wrote to memory of 3312 4100 Dragon Pals.exe 83 PID 4100 wrote to memory of 3312 4100 Dragon Pals.exe 83 PID 3312 wrote to memory of 228 3312 msedge.exe 84 PID 3312 wrote to memory of 228 3312 msedge.exe 84 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 3460 3312 msedge.exe 87 PID 3312 wrote to memory of 2832 3312 msedge.exe 88 PID 3312 wrote to memory of 2832 3312 msedge.exe 88 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90 PID 3312 wrote to memory of 2212 3312 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe"C:\Users\Admin\AppData\Local\Temp\6e16f07110dc7ea1db93bb642a6adcdd115ecf6ae2d4e615a8600c2c3e6d7d9b.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Dragon Pals\Dragon Pals.exe"C:\Program Files (x86)\Dragon Pals\Dragon Pals.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://r2games.com/link?id=204543⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff830ad46f8,0x7ff830ad4708,0x7ff830ad47184⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:84⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:14⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:14⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5292 /prefetch:84⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:14⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:14⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3368 /prefetch:84⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:84⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe8,0xe4,0xe0,0x244,0xdc,0x7ff74a885460,0x7ff74a885470,0x7ff74a8854805⤵PID:4004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:14⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3392 /prefetch:84⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1316 /prefetch:84⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3392 /prefetch:84⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3408 /prefetch:84⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,207066085333481930,1659394809132130391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7144 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5255afcb5f662a817680b1215cb64840e
SHA1cc5c8e18933e7e39e925834903a9ec4a83990aeb
SHA2567933dd11d58f56e1a382c6eb26a3f52eb37f16f832d8823c06a34bbb4b9e5935
SHA5129a4158966efec97dede74a30518d6e0cd73d80a0d5beb9b8fa6fb6a39867b428de9ec025cc94d4bb481900929f0015b31480855317f3dca868fc83e8471fcdc5
-
Filesize
178KB
MD5255afcb5f662a817680b1215cb64840e
SHA1cc5c8e18933e7e39e925834903a9ec4a83990aeb
SHA2567933dd11d58f56e1a382c6eb26a3f52eb37f16f832d8823c06a34bbb4b9e5935
SHA5129a4158966efec97dede74a30518d6e0cd73d80a0d5beb9b8fa6fb6a39867b428de9ec025cc94d4bb481900929f0015b31480855317f3dca868fc83e8471fcdc5