Analysis
-
max time kernel
154s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 07:42
Static task
static1
Behavioral task
behavioral1
Sample
cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe
Resource
win10v2004-20220812-en
General
-
Target
cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe
-
Size
139KB
-
MD5
0e9c8130006d051c003b9e1645942bec
-
SHA1
bc6acf4a3213186fbf5da2aa03af8eabf7d9a9ad
-
SHA256
cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d
-
SHA512
585da07035b0094fb870e89837c3f5292251029d17af3dd55fabde52f08e02b97d061fa40f9b58857c08d793cd87cfe66e0a9cc2ef09729ca17d4dadef4e8a46
-
SSDEEP
3072:/EMeZ+upo0psX0nVqVx2UuREoH8zYnBLN5Hj:6kF00gUx2DuoUYnBL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4488 3132 WerFault.exe 80 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Download cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3132 cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 1584 3132 cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe 85 PID 3132 wrote to memory of 1584 3132 cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe 85 PID 1584 wrote to memory of 2756 1584 msedge.exe 86 PID 1584 wrote to memory of 2756 1584 msedge.exe 86 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 4268 1584 msedge.exe 89 PID 1584 wrote to memory of 2248 1584 msedge.exe 90 PID 1584 wrote to memory of 2248 1584 msedge.exe 90 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91 PID 1584 wrote to memory of 3828 1584 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe"C:\Users\Admin\AppData\Local\Temp\cf083bd90a42a5605655d61033a70692e923e74d4fa02db007de6ec29b0b120d.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 3922⤵
- Program crash
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=gOO_UqzEc5Y2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa43a46f8,0x7ffaa43a4708,0x7ffaa43a47183⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:83⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 /prefetch:83⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5588 /prefetch:83⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:13⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:13⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7753582315870558145,4423462964399625382,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:13⤵PID:4332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3132 -ip 31321⤵PID:4560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428