Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe
Resource
win10v2004-20220901-en
General
-
Target
c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe
-
Size
46KB
-
MD5
bfec9a2d03c5c22cf433f760a118d5b1
-
SHA1
984616e1c2504d593e81b62287381184b25be869
-
SHA256
c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984
-
SHA512
3a9da914d1ae98d78e58df57eba98e651ce6edf14e5f208d0489544dd7f8a92cbffc08aac69a8a67ee5211e72e3dc33b7b661b64390007ef78b40b8e8223f0d0
-
SSDEEP
768:NyDqO1Qev5w+dMVgVarHufKOX95sXnMLuvR5pmEhgEev2Y1boq+mrltSG8x:sDqO1QevYWVarssFfxgTv2IUbsMXx
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\4e67d6d5-552c-4d42-b31b-cec73ab3620b.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221211040105.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 428 msedge.exe 428 msedge.exe 1320 identity_helper.exe 1320 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 428 4384 c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe 80 PID 4384 wrote to memory of 428 4384 c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe 80 PID 428 wrote to memory of 4908 428 msedge.exe 81 PID 428 wrote to memory of 4908 428 msedge.exe 81 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1764 428 msedge.exe 83 PID 428 wrote to memory of 1740 428 msedge.exe 84 PID 428 wrote to memory of 1740 428 msedge.exe 84 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86 PID 428 wrote to memory of 3548 428 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe"C:\Users\Admin\AppData\Local\Temp\c29f48e7c97a89088ade5ad623179f4b71029739add28eeb56eb2a4932fd7984.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.rotaryamazonia.com/.view/#redirect-viewid9872⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffcabb46f8,0x7fffcabb4708,0x7fffcabb47183⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:83⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 /prefetch:83⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:13⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:13⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5640 /prefetch:83⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:13⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:13⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:13⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:83⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff650a15460,0x7ff650a15470,0x7ff650a154804⤵PID:1192
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:13⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5184 /prefetch:83⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5212 /prefetch:83⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:13⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3800 /prefetch:83⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5680 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1808,16742696947946120959,17208536639314221515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:83⤵PID:3220
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD505377821d9bdec3c90ec67cf33aefdd4
SHA19a0df4e458e49f979ecc926d8954863d0e1be69f
SHA25667da5062418b13c889c5ead4dad4fb1c852f7a40ec7f0618327065e90a36f0ea
SHA512b6b1cf0862f5caacbce5b84889322a3daae88712af744830e0cc48cba3b55fca8084a62380080d691470db83b97830dd1626982004285b81b4e6a9cd79271635