Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
start.exe
Resource
win10v2004-20230220-en
General
-
Target
start.exe
-
Size
12KB
-
MD5
1df9e9acc548902abdbb2f5c5df3e93d
-
SHA1
f235a21d075d79c2858b3daf090c6349e366f217
-
SHA256
2a181b6674118d23e18f8d95e46f0149a12bb5c41a4b0efe3dea60fa35880bc1
-
SHA512
6ecac4c480409ca3dd835b8601c3f3e3d330e9f9a6e9a683867ae804f6ae47469df4a23fa253dc032292871f14cc4240be6f70fee4134e56d5f19882d190e6f2
-
SSDEEP
192:VT3fvS/Q10wCWXyY7ULerKBbPbqvv5+iAsAVesQ5tfMc3K:NHS/Q10wPiY76KKBbPOvRsX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 1556 msedge.exe 1556 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 1556 804 start.exe 83 PID 804 wrote to memory of 1556 804 start.exe 83 PID 804 wrote to memory of 1592 804 start.exe 84 PID 804 wrote to memory of 1592 804 start.exe 84 PID 1556 wrote to memory of 492 1556 msedge.exe 85 PID 1556 wrote to memory of 492 1556 msedge.exe 85 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 3376 1556 msedge.exe 86 PID 1556 wrote to memory of 4000 1556 msedge.exe 87 PID 1556 wrote to memory of 4000 1556 msedge.exe 87 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88 PID 1556 wrote to memory of 2912 1556 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/leshashved2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc5aca46f8,0x7ffc5aca4708,0x7ffc5aca47183⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:13⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:13⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4296 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4812893464643179036,6021745892503442630,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:13⤵PID:4684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chunk.tmp2⤵PID:1592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5462f3c1360a4b5e319363930bc4806f6
SHA19ba5e43d833c284b89519423f6b6dab5a859a8d0
SHA256fec64069c72a8d223ed89a816501b3950f5e4f5dd88f289a923c5f961d259f85
SHA5125584ef75dfb8a1907c071a194fa78f56d10d1555948dffb8afcacaaa2645fd9d842a923437d0e94fad1d1919dcef5b25bf065863405c8d2a28216df27c87a417
-
Filesize
152B
MD5d2642245b1e4572ba7d7cd13a0675bb8
SHA196456510884685146d3fa2e19202fd2035d64833
SHA2563763676934b31fe2e3078256adb25b01fdf899db6616b6b41dff3062b68e20a1
SHA51299e35f5eefc1e654ecfcf0493ccc02475ca679d3527293f35c3adea66879e21575ab037bec77775915ec42ac53e30416c3928bc3c57910ce02f3addd880392e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\08c961b9-f670-43d8-9c51-cc3ec2023a97.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5a32463810255fc2a88847e5aa7782481
SHA1914f1a809f66a7bd6796c57c5bdc70d58e2cedb9
SHA256b31a9daaadec5f0538d51e4cbc45bd7091773121a58260922fc59e2a3413937c
SHA512b819e3a71a318586ca7c9637b2c78598f396118a0a6b416777154a8af25432a0a6e1ac08095a0e608a82303c444b86b230345c7cd9d26bed8dc3ccd181601359
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD502f00474da408c07c9362606f926eae3
SHA19d652f18b47a58fd779db0a8a26c5c45ab00d50a
SHA256faa83575c9fcad517a6fd58fb1977be97af94e6c9628353fdffe30e3af9fd1a7
SHA5120315cc5e1eadaffae5adb88d44ff13879887fe9eeb1efe14051c7bf35b4ec9926005650ae3dc2a9d8b4d6f2771c50c4a46eb00c947428ecd0156fe3721008c0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e7967e32ebde81238a1e9c5e6d030fe5
SHA1176c221caacf44c21d3d0a34b1ff5f9393acbe1d
SHA256e66465c3a0de60e9c1eacec482cb74fec9573a9764dd52b25ec503878b05267a
SHA512a395dddda8bda0d4784e0192cb76da3bfea104265f617f32cef40401825b3dd0565dd2c48efb71761dc6a129e6e321054d75e7fa3bf928bed0d9a79b76ebf1ca
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD57ea9abd407cac02932b17733f9add49f
SHA1031dd520ff75d09213f207d98aa32830886beada
SHA256944e82c67316e709797309ea68ff288eff32d244ae3c8801e24ec0dc5cadeabb
SHA512a1196147d76bcabf3690573b6e6e72142677d2c3d533bc628a1f36f91d7a150f2524415919808722ed9940e405c45dcd76f636764dc239869abca3df03a8e68d
-
Filesize
442B
MD504e9b3ddc3aede2dedb3e9e0b90aa164
SHA19ce9c176dbc82af9d541f7b8e62b34a7041734d4
SHA2567fcb286f37e9c62e889b064c3749a681f2ec1533eebfbd9abd5b3aaf43f3e687
SHA512f30a15657877f5daf1420f414076aa5cf8151d5654d4d012e68dccaeeb0665c9149a083a0e5b8e94614b6ad274e82344d21aa0564486a8a0857cd1df1f712eb3
-
Filesize
5KB
MD53c258eb60627e1b1300fcf4d2dfd85ac
SHA1855608e230a079d8486836ca81c10067c7aa6ee4
SHA256542b5c60e61db5b4bbfcdfbdac4ae2d1075fffba0ffd58b1b7139e1fc0339bc7
SHA5120ea739d7b4525951a8e4d6697a73eabd9fbe29c13a2118c0b75dfbab64f93d63b3630e462c3d798b14b7887b07d31f13fb3318a19da4ca861623a6e29c9f5d3a
-
Filesize
4KB
MD526c5748d8c9813072faa38d8362f3d05
SHA1c0520075ab24feeea27766730459acc73e9ee924
SHA256af36e15c2768b481c96e2a281c992cfa123c52ac4ef249772a840ed68ba43e9a
SHA512a961ca85c279532b185c0bfeb666a356535d692878bd0188f64660bcb62604f2b67d3eec1a29fc61c87c18e55c1a648ca4e550a600ff933381e0b7836940437f
-
Filesize
5KB
MD5db2e29caee0c708f68725460d2859cfd
SHA18ad41f1dfd03fbfed3c27d32fb806d84affecc2a
SHA256fc21df6d461e090dc42fedf9cdaedbf7cec2d753084003d12f9f20185471ad8b
SHA5128aca7a780e49503a0d19680512a4d8902211bd69d30bb9332df37f406b4c0c25e2a7430c406819c403cc77e2348f6d415ac8242b874023cd6517549a34eda38e
-
Filesize
24KB
MD5130644a5f79b27202a13879460f2c31a
SHA129e213847a017531e849139c7449bce6b39cb2fa
SHA2561306a93179e1eaf354d9daa6043ae8ffb37b76a1d1396e7b8df671485582bcd1
SHA512fbc8606bf988cf0a6dea28c16d4394c9b1e47f6b68256132b5c85caf1ec7b516c0e3d33034db275adf267d5a84af2854f50bd38a9ed5e86eb392144c63252e01
-
Filesize
538B
MD503fccb8a5f451d58e0145b50e955c893
SHA1ab3a1f9d100948818765a99732d97fffd8873450
SHA2561a137a1f15585bedd987f3431f5bf1603fe0a516e553d82ca2a724e7fc528a37
SHA512eb197c8236d06d735bea0f6ae32a1867eba7912daa1c2ca723c8a5618aa9c27fda09c5e6364fe512d992d2857c9fe3b2ef273d1f21840cc7a319953deef8c857
-
Filesize
538B
MD5f1b4392c972799898dbf140cb7abaff7
SHA169adac3e1de02e7217d9ee5d98a4508d33419c7d
SHA2565b77826e8058f8ad8b0abcf2fbdc1d890d2145bdc5e7fe3f1a2033ba07f258d6
SHA5120836c7bf1a04b380ced3b5d06d2a824646ef50dd64ba236ffa1fd47a72276ebb888e15a22fb36c64847ffacf1acceb40df003e095a83a9a604f6a7459e2fc795
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
9KB
MD56bc468f2d7a7ada58aeeaf123ca5c197
SHA16a5dd1b029d4d63ff1d22891a41ec7fb8b076dae
SHA256f090add1732051ee40006c71768b38baff2c1ec4347dd4566c4f7e805058ad9b
SHA512bd2eed02a5585e4f07dd2db3ddb7339c89e969d05ab59405aad433603d9e93c5e4e27f15840c261f486940d1aadcec9f681a514a4e2812c45697dfa1ae508f88