Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 10:55
Behavioral task
behavioral1
Sample
e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe
Resource
win10v2004-20220901-en
General
-
Target
e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe
-
Size
438KB
-
MD5
4c0eb65f01028efe79019feb4badd021
-
SHA1
a2351a922cbfe0f3cc1da63ab186f1834c9f8eb0
-
SHA256
e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7
-
SHA512
a3872d5cbc7d0476d977028377590162cb6b21ab9a9af08dd8a6350f4005834cb32d2ba2200d7e61ccaa5f223e19f6a1e88253903dcc42bfad945f3a5dbfe7c2
-
SSDEEP
6144:C/OyjZRU37eLzFf85mqRVKvsMWSOFTlc6pAXF8USil/MPgHJPB7DWDggPFKzoCiG:C/ijzivs9eN1TSi/NHJdW88KzZT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4880-132-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral2/memory/4880-133-0x0000000000400000-0x000000000056D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\28dc73e9-2069-4eab-b553-d3a4b0c562e6.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221130171647.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4416 msedge.exe 4416 msedge.exe 3856 identity_helper.exe 3856 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4416 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe 88 PID 4880 wrote to memory of 4416 4880 e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe 88 PID 4416 wrote to memory of 4320 4416 msedge.exe 89 PID 4416 wrote to memory of 4320 4416 msedge.exe 89 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 768 4416 msedge.exe 91 PID 4416 wrote to memory of 4348 4416 msedge.exe 92 PID 4416 wrote to memory of 4348 4416 msedge.exe 92 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94 PID 4416 wrote to memory of 4200 4416 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe"C:\Users\Admin\AppData\Local\Temp\e098de712293e3488da4c7ae1e92137f9c791920bb9336a40a0dc96f87fda0a7.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ad.51pc114.cn/setup/QQMTDL.htm2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff861f546f8,0x7ff861f54708,0x7ff861f547183⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:83⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 /prefetch:83⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5448 /prefetch:83⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:13⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:13⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:83⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff797225460,0x7ff797225470,0x7ff7972254804⤵PID:2236
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5116 /prefetch:83⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:83⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5832 /prefetch:83⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5100 /prefetch:83⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15949202262711809970,9885488746070090020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:83⤵PID:4780
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688