Analysis
-
max time kernel
170s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 16:58
Static task
static1
Behavioral task
behavioral1
Sample
pomelo_cringe.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
pomelo_cringe.zip
Resource
win10v2004-20230703-en
General
-
Target
pomelo_cringe.zip
-
Size
43.8MB
-
MD5
da596c5fa1bfe53dc6ef777e810c2e7d
-
SHA1
dc756fddd264eaadcc0c8e8576d11259bbe1c150
-
SHA256
eafd8f574ea7fd0f345eaa19eae8d0d78d5323c8154592c850a2d78a86817744
-
SHA512
bb7a10c4d9decee9687dfba5987939d1f55c3966bd80d06103d4bde6f61df3957d89392ac185b96ac668bc794193319dad33e34dde199df91eb2981e7e5f9fc3
-
SSDEEP
196608:rAA/coo9ZmMOfGI0QIdgCUlo1JKq5LJ2q82M/nSk827:rAHX9DQGI0Q321tr82MPl
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 4696 msedge.exe 4696 msedge.exe 2632 identity_helper.exe 2632 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3784 helppane.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3784 helppane.exe 3784 helppane.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4696 3784 helppane.exe 96 PID 3784 wrote to memory of 4696 3784 helppane.exe 96 PID 4696 wrote to memory of 2312 4696 msedge.exe 97 PID 4696 wrote to memory of 2312 4696 msedge.exe 97 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 4648 4696 msedge.exe 100 PID 4696 wrote to memory of 1912 4696 msedge.exe 98 PID 4696 wrote to memory of 1912 4696 msedge.exe 98 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99 PID 4696 wrote to memory of 5036 4696 msedge.exe 99
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\pomelo_cringe.zip1⤵PID:1908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1872
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288842⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4e5746f8,0x7ffb4e574708,0x7ffb4e5747183⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:83⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:13⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2620 /prefetch:13⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2716 /prefetch:13⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:13⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:13⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:83⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14188343743176202761,14309205439900272197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD58d1e2f0c99cef62cc2bf5f2caa56e083
SHA11bd606470e8926af169d7c288ff4d5bbcb013799
SHA2562ad285e1f3c6cc3432cfd5418d1fa37d1ec1c09012471e1f5a2b344749ce615a
SHA5125b9de992f6011c5968f8fce7fe5c962b9e45dbf524cc52280f212c055486eb2b98fa4a2066f09444baa19daeadcce8d6ee395aae12f08d9c74f291007173250d
-
Filesize
5KB
MD53771e8a5e97b0347494672e2c4e1e364
SHA1b2b1bea51e670370b1a706d1a93557bd327ecdf0
SHA2562e7b669d95bea5682c75ff76a5c252675e1624108fcd25c802a635e9ad6ca764
SHA5123bc72686583ba299bd73c560b24339441c790a28555580b4eb38373e8baeb63dab94bbc3bf31b1603a1f093200de4d200626d8b20d03afb31671a2c1bb2cc968
-
Filesize
5KB
MD50f708505e0c06b676f12f4139a6c2134
SHA10288cabe44555a8dea295a1f02ce3a974be13452
SHA256517e89481132a61317b09689405f5b10cf796f08d54724d368d4cfdbd0b0e121
SHA512fe791ec6b17d07977fce29ed1e85e0fb046530e32b1c863076050cc6fca9f12185a9f38bba10cbde98eb2239c4cb7b599b9bff23fa00bdb6868321fa7ac6aaad
-
Filesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5fc0fcc24d3aeb3615cb91556ffae037d
SHA17976382426cc4e1a885804d3137efff21f4270fb
SHA2562e6cca76f750b72515abeb707d4a70e181edf3435f4916f350c6ed9d81dbe94e
SHA51226c0ad64daf51be78600f966cc8ebe61ba82d228e750168beb3bbde3d128464e749f98565b6f3448f477d8e90cc9d82fdb263df26424495af19d258a77ea6270