Analysis
-
max time kernel
189s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe
Resource
win10v2004-20221111-en
General
-
Target
ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe
-
Size
90KB
-
MD5
2cc78111d2a9d5660bc6f28aca850c29
-
SHA1
bdebebd6d337b60025fbf3cace1468a80cfe0756
-
SHA256
ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5
-
SHA512
03719b4bbc8df97da01969f3ffa82fd9c0eea6cb6c825b3d51cc63821037e0381a9be11dd6434a20145670831d477dacb7d26ef7a992c6e4b9b830772bdc5ce6
-
SSDEEP
1536:eDNjjsDQg/mqTpLUeyXjEvjnyTTPU5Tb6mQKf4:eDtzg2RXQmvU5TU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 2040 4164 ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe 85 PID 4164 wrote to memory of 2040 4164 ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe 85 PID 2040 wrote to memory of 4628 2040 msedge.exe 86 PID 2040 wrote to memory of 4628 2040 msedge.exe 86 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3512 2040 msedge.exe 90 PID 2040 wrote to memory of 3844 2040 msedge.exe 91 PID 2040 wrote to memory of 3844 2040 msedge.exe 91 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92 PID 2040 wrote to memory of 1824 2040 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe"C:\Users\Admin\AppData\Local\Temp\ea8e716a50e35e2f5cea8a8774b6cf029e83ddc5fa4c6ff063dddc27180ed2b5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vse-oshibki.ru/data/setup_920406.exe2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecdf046f8,0x7ffecdf04708,0x7ffecdf047183⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1340 /prefetch:13⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:13⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5759938308768788797,5172222915451426848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:23⤵PID:3424
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516