Analysis
-
max time kernel
131s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 13:56
Behavioral task
behavioral1
Sample
0180decb30ec5d3934893c90995b2aca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0180decb30ec5d3934893c90995b2aca.exe
Resource
win10v2004-20221111-en
General
-
Target
0180decb30ec5d3934893c90995b2aca.exe
-
Size
118KB
-
MD5
3c1dfa79853ff35edbeea726aab5973b
-
SHA1
3cd25a3e1cd56ddf2a94ea4a2838272830785318
-
SHA256
90cd59c68786051a318d8ba3371ac0607d13d7e00e1c982a2dfb68b5019f9eda
-
SHA512
819874fc043e298b42792b05170a6cceaa0f0925f544af90afbc2ea599d4d52b642044de24ab76320d62fe3b06918c7de2a0750258a5613405c70e50f6b88626
-
SSDEEP
1536:H+p+iPNAL0z81YHKDgnkt9tMDyC+9BDYz39:HOvFRCgkIDyt9BDk39
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a48fc3e4-9e79-46d8-b8b7-6e0424aad5b9.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230206145715.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 1748 msedge.exe 1748 msedge.exe 2204 identity_helper.exe 2204 identity_helper.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1748 1800 0180decb30ec5d3934893c90995b2aca.exe 84 PID 1800 wrote to memory of 1748 1800 0180decb30ec5d3934893c90995b2aca.exe 84 PID 1748 wrote to memory of 4360 1748 msedge.exe 85 PID 1748 wrote to memory of 4360 1748 msedge.exe 85 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 4136 1748 msedge.exe 88 PID 1748 wrote to memory of 2860 1748 msedge.exe 89 PID 1748 wrote to memory of 2860 1748 msedge.exe 89 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90 PID 1748 wrote to memory of 4228 1748 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0180decb30ec5d3934893c90995b2aca.exe"C:\Users\Admin\AppData\Local\Temp\0180decb30ec5d3934893c90995b2aca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0180decb30ec5d3934893c90995b2aca.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa4b5d46f8,0x7ffa4b5d4708,0x7ffa4b5d47183⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:83⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5372 /prefetch:83⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:13⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4640 /prefetch:83⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:13⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:13⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:13⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:13⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6660 /prefetch:83⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff718355460,0x7ff718355470,0x7ff7183554804⤵PID:4452
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6660 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1480,5016597919992258859,16794265123115574008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0180decb30ec5d3934893c90995b2aca.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:1740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4b5d46f8,0x7ffa4b5d4708,0x7ffa4b5d47183⤵PID:964
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c71cb7463c49e125cbae14ac265cf18f
SHA14430c030546d725e7f6e5584f139e012e9214f06
SHA2561eb6d93849a5c52e9b381fc0abd82b401e2d1e5dfbedd48a3cff50e91e758018
SHA5122f1317d23dfe8c39760e51900cfaed49a2ba4675f0904ec033252e037e0eb935e59b4cc0b8c11c4acd7cfbddf0d9d461f5a66504494863c2bb7781aa3c000eed