Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe
Resource
win7-20221111-en
General
-
Target
8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe
-
Size
73KB
-
MD5
1e315b65fb2043ad635a176ebf0cd400
-
SHA1
1c12b8ea23969f4579ce04458064d2dfc6c275c3
-
SHA256
8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc
-
SHA512
766be4f841fe87951aed9cbf617203fc4013b42cf29d3f5396e4b7e2a3d82711ef0b0f3d5b934783eaa0def763341706d225b19694441dff174e5aa568b3dcc7
-
SSDEEP
1536:Irj30xkQLVKRfsWJayNSY+A37feaCMJDmYsLIb4PvYqHB/AdGC:4kxZLA1bZSDADeak7dJHB/AdGC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 240 msedge.exe 240 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1608 4876 8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe 82 PID 4876 wrote to memory of 1608 4876 8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe 82 PID 1608 wrote to memory of 4392 1608 msedge.exe 83 PID 1608 wrote to memory of 4392 1608 msedge.exe 83 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 364 1608 msedge.exe 86 PID 1608 wrote to memory of 240 1608 msedge.exe 87 PID 1608 wrote to memory of 240 1608 msedge.exe 87 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89 PID 1608 wrote to memory of 3528 1608 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe"C:\Users\Admin\AppData\Local\Temp\8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8cd2946f8,0x7ff8cd294708,0x7ff8cd2947183⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:13⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:13⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:13⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5036 /prefetch:83⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:13⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:13⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:13⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:13⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,2591224267624455588,17119261273387291070,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6412 /prefetch:83⤵PID:1256
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8fe97c751b3caeb2817f9d60b60f5ab431f936b22f8b0cf9d1ff1363719909bc.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:3676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8cd2946f8,0x7ff8cd294708,0x7ff8cd2947183⤵PID:3700
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20