Overview
overview
10Static
static
38.27.exe
windows7-x64
78.27.exe
windows10-2004-x64
3office安�...��.exe
windows7-x64
8office安�...��.exe
windows10-2004-x64
8pdf.exe
windows7-x64
1pdf.exe
windows10-2004-x64
3test.exe
windows7-x64
1test.exe
windows10-2004-x64
1企财险�...��.exe
windows7-x64
10企财险�...��.exe
windows10-2004-x64
10截图1-8.exe
windows7-x64
8截图1-8.exe
windows10-2004-x64
8方案D.exe
windows7-x64
1方案D.exe
windows10-2004-x64
1苏宁系�...16.exe
windows7-x64
1苏宁系�...16.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 14:07
Behavioral task
behavioral1
Sample
8.27.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8.27.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
office安装助手.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
office安装助手.exe
Resource
win10v2004-20230824-en
Behavioral task
behavioral5
Sample
pdf.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
pdf.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
test.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
test.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
企财险中财产基本险中第四点飞行物体及其他空中物体坠落表诉不清存在歧义.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
企财险中财产基本险中第四点飞行物体及其他空中物体坠落表诉不清存在歧义.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
截图1-8.exe
Resource
win7-20230824-en
Behavioral task
behavioral12
Sample
截图1-8.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
方案D.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
方案D.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
苏宁系统测试bug流程文档20230816.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
苏宁系统测试bug流程文档20230816.exe
Resource
win10v2004-20230703-en
General
-
Target
pdf.exe
-
Size
3KB
-
MD5
1f53ae6118faec2c66ccc0a7229786f0
-
SHA1
797573dc4564a054e309b66150431dc83c9981a7
-
SHA256
3a49e2e35e719f6b5719f59af3709a9f8a6a84a9413778b5c1f9fb630461298c
-
SHA512
c6d743267068d50cfa4bf478439f9f029046518cdfab4a4f0e03cfe5b753ba95a21c101a17beb62a6160a629be3cad265f610dccae95c48e0ec9017230b13710
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 880 msedge.exe 880 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1456 2848 pdf.exe 82 PID 2848 wrote to memory of 1456 2848 pdf.exe 82 PID 972 wrote to memory of 880 972 explorer.exe 85 PID 972 wrote to memory of 880 972 explorer.exe 85 PID 880 wrote to memory of 1408 880 msedge.exe 87 PID 880 wrote to memory of 1408 880 msedge.exe 87 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1696 880 msedge.exe 89 PID 880 wrote to memory of 1872 880 msedge.exe 88 PID 880 wrote to memory of 1872 880 msedge.exe 88 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90 PID 880 wrote to memory of 4480 880 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdf.exe"C:\Users\Admin\AppData\Local\Temp\pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" http://www.baidu.com2⤵PID:1456
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.baidu.com/2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2eed46f8,0x7ffa2eed4708,0x7ffa2eed47183⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:83⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 /prefetch:83⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:83⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:13⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:13⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:13⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3104910444213711788,16960311212928672511,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc99b0086d7714fd471ed4acc862ccc0
SHA139a3c43c97f778d67413a023d66e8e930d0e2314
SHA25645ef01f81605bfd96126d5520c5aa0304c7fa7d5fdb3e4d5b2dd2bf84e2afd96
SHA512c308fa3eda9235d67a506a5f058fefb9a769ec01d7b0d4f5a2397892cc4f8155301c55c1fac23bebacdd087ab3f47f1eacc9ff88eff4115a7d67aa7b1d6581a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5549870fc8a4dd975e6cd90b5e1e00378
SHA1e832389f64b2f19198cf47cc6dc8b9914f284be4
SHA256b9dd484fb44d145337954e7f191f3ee9b9141252a3fb894a82863f0f66cb48eb
SHA512f2e953870c86814265155f668b30bbd742a6e4b8a0dfdd9445c9861e2b96b6ea5e053340312bcc228912f7f2f80a9488c130f5082d19a1214daa6f2aecfa0021
-
Filesize
259B
MD5118841947038294c28686fc4d818d9ae
SHA147667fe07d0d4387c2f71f57df2921a863575431
SHA256d8e3f585e81ce98c69a992576c4b51314b61ef4b06d530655dfe3ead1b482af1
SHA51247edce03bc2e3d929bed5011e1052ecb2527cf315178b994fba11dbf7ac6be4d37760f8ac6a998109370cb6917c3b33633a149fe52d699306f9aba3a7800b2e7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e5b718a3b2e3651081b0e77e2d8f09cd
SHA1309d0734e95326eb80d172762853641034dab429
SHA25645fe26d305a25222dc3f3ce27b98e592e47f2f968f1c006b67749eea418f9fe4
SHA512edfb31a87f5ba4987d23fad8137395a96299cd9977f199f70bc99a18b75960a93c7342df6d95a31c295cb34565cb4c809c2ed2172c51197708df33d54f06c90d
-
Filesize
5KB
MD5bab1bb4a48a890bcf7868fd2dea39367
SHA17b5620d270585fb29a2f33b8cff928ca32ff1a8b
SHA256d8eac38c19c5aa5cf55f95056f0a0871c876965b30089c04b5546ae72abb4938
SHA512c411b683df93c19f6d08f3430109a32e4f58156a2b5f6ca38c69452a5adc74359096b61098a023d092ddfc8654d6add08b52167829aa42fcce9435a33888bc2a
-
Filesize
24KB
MD596f00bbd6a174879c58220f95f0115f5
SHA1d3d7f82b0bf27daf1b3903bfe050c2d05422050f
SHA256644442e740a8c0bb20f712f6f84f5bf4a81bb29d4e9446b2832ca65618961107
SHA512e7c5e90eb85aee7b81b9c163f618ad3789a48b256040f6f00eee7fce52c60e1ff491bf0538b9c846fb115b73163710e46a45ce056e3b41ca59d88c421502ccea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51031bc751d2648e39ed9d4cb2581376a
SHA11025e742f671ae9896fbc54c1827213c5b516580
SHA256e2dd32b5384225c3ac8e3e1fc9ca53f08a41c48449b944f2f622ad7441b4924c
SHA5127e75e4fbfb7f9c21c06db4f20a29306b6a4a41280487f458863862b8329e6654b98a64111238f4887924e97fa28e56e5a5b60a9651a6f5b82699bef54b0e4a9a