Resubmissions

15/09/2023, 15:51

230915-takwkagb32 7

15/09/2023, 14:43

230915-r3tcasfe33 7

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2023, 15:51

General

  • Target

    HWiNFO64.exe

  • Size

    7.7MB

  • MD5

    b80055450eacf3dbfcd544a18e02cf20

  • SHA1

    34b2a89a287a47465b4e9ff641b7bbd67595fc07

  • SHA256

    4764c7bde13b2095c0080a8d5e71619b1bc9ab62a938ea36f0a8e0315c50c37d

  • SHA512

    b4bdb5e983876a835053a71b26172cc3785a8b2816eaca89ae675094c55eac84aadc81ad77b226c19fcc9ad21a664c3daafdc5435989628a4099a3349d4d5429

  • SSDEEP

    196608:St2brrlWdbWhbrgrd/5gt2vmamSixHt258Nqm2GGG2yvXXPxnGP:1rrQdbW5Qxgt2udfZ0VsGG/vPxn6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWiNFO64.exe
    "C:\Users\Admin\AppData\Local\Temp\HWiNFO64.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hwinfo.com/licenses
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe363d46f8,0x7ffe363d4708,0x7ffe363d4718
        3⤵
          PID:3948
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2736
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
          3⤵
            PID:2248
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
            3⤵
              PID:4320
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
              3⤵
                PID:2064
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                3⤵
                  PID:1868
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:8
                  3⤵
                    PID:4960
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13340510636694491034,856627854698841079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1300
              • C:\Windows\System32\winver.exe
                "C:\Windows\System32\winver.exe"
                1⤵
                • Suspicious use of FindShellTrayWindow
                PID:1476
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1620
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:5116

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          16c2a9f4b2e1386aab0e353614a63f0d

                          SHA1

                          6edd3be593b653857e579cbd3db7aa7e1df3e30f

                          SHA256

                          0f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81

                          SHA512

                          aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          264B

                          MD5

                          21b77bbe32b2e11cdc542121165792a6

                          SHA1

                          dd6386c445e0f587a07490ce2f1804e401722d4b

                          SHA256

                          1792e882511e54073bdc4c034521225e0501add644fd9e3ef9e134539ef7c8ae

                          SHA512

                          0f6531bbb88ab5b6c4a9de72a20be84704a97750c3b32fd02d755b241a06927ae2522263d89706b85f46b5208cd83faaf3b158c025d8b78e73f26959861f997a

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          d95b7815df1648a9fce687a6b5cd1270

                          SHA1

                          0204df805514e4155ced9c495ed5dbe9b5b2803b

                          SHA256

                          71c614eb7fd04447898004053cff3a87c29de356115e562f14d56944501cce58

                          SHA512

                          38beb72f199a0afd12f43e7512ad558d52d1abe17c62ea881f062befc93216d9357a87f179649903bd3614db27785ba5e72d1a954c93e25c23c5b4b60977affa

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          5fdd38187108a6854e3a6fcd97f4b697

                          SHA1

                          e7fe673bc0d293d896ef478028ad4e4061a09040

                          SHA256

                          9d56b18e2b0102505d01bd07cef8928c859a45a1a33b6dca0f4eecc6fcabc94c

                          SHA512

                          6b7b3d3f1bbf0a123e0f7c6ec91fb1b689b4def3446764b84ea2e8b8fc82a4b5bf4dd8536c1cde72a650266670110540845d3c14bdf0717dc1f1d7af5bd873d1

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          d649330b2cb02228068fa94eac466036

                          SHA1

                          c657e478622b7e41b1e2062af57acfb74f140840

                          SHA256

                          c6c65c116ef3355e987b68f12e3d5999a0db867b9aba6dc73fff4f435054f52f

                          SHA512

                          fd0c3e3c3048af9cefaaefef7888ca1ff12e99d3f461ec66e6ae1fae426b79db7e92ab72eeaacaf70316da841fb5dcbd4be4e1e1bf96653578b7b84d68e135cf

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          11cf6d30ad0e964cedf637c026524de2

                          SHA1

                          e3ae3ab7de4cbb36493ed67005b6df7381643a3e

                          SHA256

                          4269a3941d8eea6dac499e044572c16890a70684f5c75eed8f42aaab03ad7525

                          SHA512

                          87512b02083e09cc77f6d756b7deb818ecbf703d7440e93572333ab6adae53a16f6e1cd20111120904c696effae871a1e9ea9647b026c3fb0c313c0bb354bee9

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          11KB

                          MD5

                          4a1f7212b0b62da939395a0b20d4cec2

                          SHA1

                          69f67ef534b42b5bf57953464a31039dcb22cfc6

                          SHA256

                          169fafb068596a0f9374fc5b1a7716f58e00ef6522db074f1e9b9bd507e482a7

                          SHA512

                          68bcdf7bb2b8d39eb27cefc5a8d8ac2cd1e3c3f71a3ee3a53c3518a6321ff35000edd2209e288293a104649b6f26aefc08be1299ef891eb0ce52a9236fb97805

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          2056644b1af7d1a7f73ecaec6db94a57

                          SHA1

                          83267dbeb7766e4bb96ded39818e940f8b90f65b

                          SHA256

                          12e42432bd613de43782774335c8237a45bf3c5e741576c08ff8d78a772ef262

                          SHA512

                          e3af066227d21b71a3b546e44212ab51d717e43bed500f7b2fba0ab7ce5387a0c465be74277ea6a035789b0610160b2769bd3e94e74685c29a36caa0a87b5c12

                        • C:\Users\Admin\AppData\Local\Temp\HWiNFO64A_180.SYS

                          Filesize

                          57KB

                          MD5

                          a31f7ef45931c760bc92ae1c79b9f200

                          SHA1

                          ebeb00d6124f8462cc1414e7cd605a2eb4011056

                          SHA256

                          f22a7599d824dde73d513d1d9c8ea03630bd261b4e94f0e98b472ea8f4dac6e1

                          SHA512

                          3681e8c81bd2ba246e5533aa3640d6c22e4d2dbc404f06df656bd2d757fdda4b280ee8374138bb288efe6298dbadfe47418848a46b0df58a97bfe421ee4e6cc1

                        • memory/2208-84-0x0000000140000000-0x00000001414C5000-memory.dmp

                          Filesize

                          20.8MB

                        • memory/2208-0-0x0000000140000000-0x00000001414C5000-memory.dmp

                          Filesize

                          20.8MB

                        • memory/2208-2-0x0000000140000000-0x00000001414C5000-memory.dmp

                          Filesize

                          20.8MB

                        • memory/2208-1-0x0000000140000000-0x00000001414C5000-memory.dmp

                          Filesize

                          20.8MB

                        • memory/2208-3-0x0000000140000000-0x00000001414C5000-memory.dmp

                          Filesize

                          20.8MB