Analysis
-
max time kernel
182s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:57
Behavioral task
behavioral1
Sample
91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe
Resource
win10v2004-20220812-en
General
-
Target
91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe
-
Size
399KB
-
MD5
453d2dfebf0a6b6840ef9d3b37dfdf6a
-
SHA1
f24a9a81adff6b8b26e5875baada7a9dd7157656
-
SHA256
91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e
-
SHA512
1328b5349770772817779270ad45feb947b8b2a1a8dc7bff75b5b4a1dae0c3224e3a6752f2c1968b226f50b2117588c51efbc7378f1b7167edc9128aafdea5fa
-
SSDEEP
12288:wzN136/lBbIN1SY3P7bf06G4xIpYB1Fu8p:wzNJ6/lq7S08WGq3u8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4964 oTVslskijYRxhFfN.exe -
resource yara_rule behavioral2/memory/4588-134-0x0000000000400000-0x0000000000A0D000-memory.dmp upx behavioral2/files/0x0008000000022e03-136.dat upx behavioral2/files/0x0008000000022e03-137.dat upx behavioral2/memory/4964-140-0x0000000000400000-0x0000000000A0D000-memory.dmp upx behavioral2/memory/4588-142-0x0000000000400000-0x0000000000A0D000-memory.dmp upx behavioral2/memory/4964-166-0x0000000000400000-0x0000000000A0D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\4268d772-12b2-40c0-acb6-d1558d83164b.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221211122836.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 4868 msedge.exe 4868 msedge.exe 2580 identity_helper.exe 2580 identity_helper.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 4964 oTVslskijYRxhFfN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4964 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 79 PID 4588 wrote to memory of 4964 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 79 PID 4588 wrote to memory of 4964 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 79 PID 4588 wrote to memory of 4868 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 80 PID 4588 wrote to memory of 4868 4588 91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe 80 PID 4868 wrote to memory of 1324 4868 msedge.exe 81 PID 4868 wrote to memory of 1324 4868 msedge.exe 81 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 2972 4868 msedge.exe 84 PID 4868 wrote to memory of 3500 4868 msedge.exe 85 PID 4868 wrote to memory of 3500 4868 msedge.exe 85 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86 PID 4868 wrote to memory of 216 4868 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe"C:\Users\Admin\AppData\Local\Temp\91fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\Sun\Java\oTVslskijYRxhFfN.exeC:\Users\Admin\AppData\Roaming\Sun\Java\oTVslskijYRxhFfN.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.a-file.net/member/exe_contact.php2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8857346f8,0x7ff885734708,0x7ff8857347183⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 /prefetch:83⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:13⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 /prefetch:83⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:13⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:13⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:83⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:5104 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff74acc5460,0x7ff74acc5470,0x7ff74acc54804⤵PID:4932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:13⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6284 /prefetch:83⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,13753820233095796480,14586367935461685611,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5453d2dfebf0a6b6840ef9d3b37dfdf6a
SHA1f24a9a81adff6b8b26e5875baada7a9dd7157656
SHA25691fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e
SHA5121328b5349770772817779270ad45feb947b8b2a1a8dc7bff75b5b4a1dae0c3224e3a6752f2c1968b226f50b2117588c51efbc7378f1b7167edc9128aafdea5fa
-
Filesize
399KB
MD5453d2dfebf0a6b6840ef9d3b37dfdf6a
SHA1f24a9a81adff6b8b26e5875baada7a9dd7157656
SHA25691fb5ab7454f13145c6de0e9776f7444dc28f58a86a9203b47dd739452eb651e
SHA5121328b5349770772817779270ad45feb947b8b2a1a8dc7bff75b5b4a1dae0c3224e3a6752f2c1968b226f50b2117588c51efbc7378f1b7167edc9128aafdea5fa