Overview
overview
6Static
static
1Remix 1.4.rar
windows7-x64
3Remix 1.4.rar
windows10-2004-x64
3Remix 1.4/...m0.bat
windows7-x64
3Remix 1.4/...m0.bat
windows10-2004-x64
6Remix 1.4/....4.jar
windows7-x64
1Remix 1.4/....4.jar
windows10-2004-x64
1Remix 1.4/...4.json
windows7-x64
3Remix 1.4/...4.json
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 02:29
Static task
static1
Behavioral task
behavioral1
Sample
Remix 1.4.rar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Remix 1.4.rar
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Remix 1.4/Instalador by M3m0.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Remix 1.4/Instalador by M3m0.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Remix 1.4/Remix 1.4.jar
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Remix 1.4/Remix 1.4.jar
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Remix 1.4/Remix 1.4.json
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Remix 1.4/Remix 1.4.json
Resource
win10v2004-20221111-en
General
-
Target
Remix 1.4/Instalador by M3m0.bat
-
Size
960B
-
MD5
54f312ca529a032834917ac60e60b736
-
SHA1
7e644550eed2ce00c4cec30cdf0a05dc0e48ecef
-
SHA256
f5b3fd3e6b9479024edd10e18f53de1e4af734b9dc36a7d80a01e0390d8c9134
-
SHA512
c061090019e3b3ee7b172792c3adea20cd989201485880f9aa443342263c0e0376c95a963ea7ce9b7bf1fdab9f45ad411827173627a4fd8c0f46589a8bdf3cf7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\830ba836-fa34-4c85-a08f-a7f910cce554.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230206023030.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 3772 msedge.exe 3772 msedge.exe 4600 identity_helper.exe 4600 identity_helper.exe 5856 msedge.exe 5856 msedge.exe 5856 msedge.exe 5856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4772 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3772 1884 cmd.exe 83 PID 1884 wrote to memory of 3772 1884 cmd.exe 83 PID 3772 wrote to memory of 5076 3772 msedge.exe 85 PID 3772 wrote to memory of 5076 3772 msedge.exe 85 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2376 3772 msedge.exe 87 PID 3772 wrote to memory of 2692 3772 msedge.exe 88 PID 3772 wrote to memory of 2692 3772 msedge.exe 88 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90 PID 3772 wrote to memory of 3548 3772 msedge.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Remix 1.4\Instalador by M3m0.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https:www.youtube.com/channel/UCJIYGEnR0RPj1H6Pk0iy7rQ?sub_confirmation=12⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff984bf46f8,0x7ff984bf4708,0x7ff984bf47183⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:83⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 /prefetch:83⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:13⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5692 /prefetch:83⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6180 /prefetch:83⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:13⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:13⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:83⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1f4,0x22c,0x7ff65f765460,0x7ff65f765470,0x7ff65f7654804⤵PID:4120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4792 /prefetch:83⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5304 /prefetch:83⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5940 /prefetch:83⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5664 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12869724709397800024,13189404398702410909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5896 /prefetch:83⤵PID:5940
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x4201⤵
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928