Analysis

  • max time kernel
    31s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2023 22:56

General

  • Target

    BruteForcers PACK/BruteForcers PACK/All Mail Brute/MailSoft/ssleay32.exe

  • Size

    4.1MB

  • MD5

    e768bbea30e671a8116f1eaa706c4d93

  • SHA1

    7159ad7082be7aa7f533ee88e364cfcc5c528deb

  • SHA256

    e436924a2fac62b5df8e77b588ce8e3f8c23075e1367c6c53fbca70ff3107e42

  • SHA512

    407ce9c8a367510a7c010da53a17f7ee218dc38cdd0882d4eb46e81e3e66126d943e5c5034f18a964c36d8260e8921ed088714a0e76793c51b30dd378750eeed

  • SSDEEP

    49152:PXNu1x0AwbFCsORuyFySj+EGQE06pHsQxHoabGyEVLThT6yB:PqwbFCPr9GSQxwV/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\All Mail Brute\MailSoft\ssleay32.exe
    "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\All Mail Brute\MailSoft\ssleay32.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://chf.su/
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff876bd46f8,0x7ff876bd4708,0x7ff876bd4718
        3⤵
          PID:2052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
          3⤵
            PID:248
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:112
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:8
            3⤵
              PID:756
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:1
              3⤵
                PID:4304
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3628 /prefetch:1
                3⤵
                  PID:2764
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9954409276770411820,16415855281166086092,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                  3⤵
                    PID:2628
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2800

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  610003c56a177b0384d6fb52bddd79da

                  SHA1

                  dee64128972597ba8c0ae9f4ac502c1065c670d9

                  SHA256

                  750ed9c6bf8f2155b43e1e9684ab39c383ef2bdf375ae7820a488b59f0495877

                  SHA512

                  c8394769c6ed907ba07a087ee29c62e61f1aa490cc11a431831010221cd789a8f8a8be33c8894e76dc1bbeea7c512b2ce6db76427c470c1a74c9d5bfd3ef6298

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                  Filesize

                  70KB

                  MD5

                  e5e3377341056643b0494b6842c0b544

                  SHA1

                  d53fd8e256ec9d5cef8ef5387872e544a2df9108

                  SHA256

                  e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                  SHA512

                  83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                  Filesize

                  2KB

                  MD5

                  51a8f279e6e050b26af92d734268382e

                  SHA1

                  1bd6c2bc3e8a8b2ed96beff909bae5fc77941a91

                  SHA256

                  92512a25b5b3edd6657a6963ec8e4f1eb2761f59bc7e761f4d8821226b4b0754

                  SHA512

                  21e7493b493268d8c27596f1f0fda82002feec47e0f2d3ee88975e9a670f0784f892edfa8d5d28c716032b9bfabe882bffea7cdaacb2768bdeb959d137696329

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  6dde6e128e3e6b9f4d7d9b9ce952f507

                  SHA1

                  69462516dbb499de663180fbab805dc5bd80b18b

                  SHA256

                  17f14ca5820a1f555f0517f1cded7c7c63b5ddf0d3d069238cce767bb63b236d

                  SHA512

                  6ee078ee445013bc2ff64153305e7bd2f344603bbbc26e033a28d6d17cc9586add0331ce68173799ba7314d4312e2825932f42ecb6fdfc4bf006ceb667fc7585

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  b1032b0aedb496369d76115fbf492512

                  SHA1

                  05304a7b4749f8cd780c33de6103fd7c3e4c2e96

                  SHA256

                  0785e74a4efde02c46deb10bf401cb7782656bc1ab7895a130265d29c99f06be

                  SHA512

                  2e756f6dc9285ea20534132e97bc29cc2e41ecf5721acd00b2bd7f87b17e57ab6803cc65c1ba030bd271ed72ac6543fbf4d0748400d4c8d869c9286818242dee

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                  Filesize

                  24KB

                  MD5

                  4fd054c69665ea437b1a20e418c64443

                  SHA1

                  e8d9eee4354ebfe06180117f718441784241577e

                  SHA256

                  3019dfc3ad41088ef51f0c69004e66fd2e97176ca542fa07cad3ed9b2c00eaa5

                  SHA512

                  8b2067e825a1cbb619519a1d07ecca6aed7751f7690042108a6cc48241a734f1e0d1f027baa07d6fe27ad58c5dd7da41a0daa749edd2a0c18921cece1b08e12c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                  Filesize

                  24KB

                  MD5

                  b19b048548718e5ec507132a64ae96af

                  SHA1

                  95b7e9da11ae6d6abc367e8a37e3bcc203eeedbf

                  SHA256

                  b48eb5eb7e44576078ed25adfa3f819949a29cda229776860aca77c19107f892

                  SHA512

                  942d72f9f25550a31bcaf134f41c612f08392adc112d9d58e4187bca76f26d7e012cdd0bffadb1dce574254a6474ee604ca8dff2335d812566fc0fdb1155124d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  9KB

                  MD5

                  7a067f934d9b4344e013e87fedd98008

                  SHA1

                  e670ea89afe128057377bb106ae437eb1dff980c

                  SHA256

                  6c2e1d8643b6ae908d1eb14d2a855b238ac281c7529850d6d98d1c625c66c3c8

                  SHA512

                  08eb3042b5d2160bea2abf0e6ce65900a9a2c9c1ac9ed432f6c51da98c481560cef614742617641f803f740aace9ddbac3e4df904fcf4ff5d332785403f53524

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  12KB

                  MD5

                  c16645941c27e2b631e508bb4b0d150f

                  SHA1

                  18e36cb8850c557e89490f0d53e40ce611d6e952

                  SHA256

                  2e83a5e8d32de2af7843cad4f974a9748320d2987d32d45b16331dac40551b8f

                  SHA512

                  a13655fc1d0054675bd69f63a4e9d0a295673226c4761225c1c3477c37e77d55e8fd186f346bbc7dfdb8d9f526a4851442f6e64cd59c0f61c142deef51e24f29

                • \??\pipe\LOCAL\crashpad_4484_IDDJXSPBCKLHRUBP

                  MD5

                  d41d8cd98f00b204e9800998ecf8427e

                  SHA1

                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                  SHA256

                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                  SHA512

                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                • memory/708-176-0x00000000024A0000-0x00000000024A1000-memory.dmp

                  Filesize

                  4KB

                • memory/708-150-0x0000000000400000-0x0000000000829000-memory.dmp

                  Filesize

                  4.2MB

                • memory/708-133-0x00000000024A0000-0x00000000024A1000-memory.dmp

                  Filesize

                  4KB

                • memory/708-235-0x0000000000400000-0x0000000000829000-memory.dmp

                  Filesize

                  4.2MB

                • memory/708-134-0x0000000004AC0000-0x0000000004BBA000-memory.dmp

                  Filesize

                  1000KB