Analysis
-
max time kernel
187s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
c996cb8bf5948c5f7b6bf85b572c4c5f5cc342d865ed1a12ab09f4d0c96cf45e.url
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c996cb8bf5948c5f7b6bf85b572c4c5f5cc342d865ed1a12ab09f4d0c96cf45e.url
Resource
win10v2004-20221111-en
General
-
Target
c996cb8bf5948c5f7b6bf85b572c4c5f5cc342d865ed1a12ab09f4d0c96cf45e.url
-
Size
80B
-
MD5
de402b5eb68aab91de22eb31d4a2cd2b
-
SHA1
9b9e9a3d438d6f723c693cff6d4308d93805be01
-
SHA256
c996cb8bf5948c5f7b6bf85b572c4c5f5cc342d865ed1a12ab09f4d0c96cf45e
-
SHA512
c450bb2581e79a78aa62bf8e85261da1aaa7c8861979195342405da63587faecfb2cbd0a3cceb90816fd5b46afd0c25fd6fe50df2a194a90791b2970a23d70cd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 4520 msedge.exe 4520 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4520 1596 rundll32.exe 82 PID 1596 wrote to memory of 4520 1596 rundll32.exe 82 PID 4520 wrote to memory of 1052 4520 msedge.exe 84 PID 4520 wrote to memory of 1052 4520 msedge.exe 84 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 4984 4520 msedge.exe 87 PID 4520 wrote to memory of 5072 4520 msedge.exe 88 PID 4520 wrote to memory of 5072 4520 msedge.exe 88 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89 PID 4520 wrote to memory of 4432 4520 msedge.exe 89
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\c996cb8bf5948c5f7b6bf85b572c4c5f5cc342d865ed1a12ab09f4d0c96cf45e.url1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cr173.com/?9992⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xb0,0x104,0x7ffd70c246f8,0x7ffd70c24708,0x7ffd70c247183⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:83⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:13⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:13⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2976 /prefetch:83⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,6145401466173059127,3162531124077598146,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3320 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688