Analysis
-
max time kernel
1761s -
max time network
1697s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
unnamed (2).webp
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
unnamed (2).webp
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
unnamed (2).webp
Resource
win10v2004-20230915-en
General
-
Target
unnamed (2).webp
-
Size
169KB
-
MD5
c6fb0bcf928d218e1533a0412aeebde1
-
SHA1
4ccc184034bc046ccc161b53910a490654974732
-
SHA256
21c64e20e1067a0905d5e5fbc82e36cdc298df90e3d4ecc0f839b67a27c8ff00
-
SHA512
25599d9087fbc0fa5bb52108d65709c8efb8e5fc347a852047c290d316341e6d5454eb36733b52bd08daa57cc3d160b57db2806c1b127ed04c9a45957dd19ea8
-
SSDEEP
3072:W90FRJ6uN5HaB1ZzCR2BmR20dZrWPIbKuI9qmHCzHGbT7O8Rvts9L+ZkT8casc3L:W90FRJVeER5R79aI2q3bV89ts9L+Cgs2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1040 msedge.exe 1040 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1040 3776 cmd.exe 80 PID 3776 wrote to memory of 1040 3776 cmd.exe 80 PID 1040 wrote to memory of 3972 1040 msedge.exe 83 PID 1040 wrote to memory of 3972 1040 msedge.exe 83 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 4728 1040 msedge.exe 85 PID 1040 wrote to memory of 1668 1040 msedge.exe 86 PID 1040 wrote to memory of 1668 1040 msedge.exe 86 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87 PID 1040 wrote to memory of 3964 1040 msedge.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\unnamed (2).webp"1⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\unnamed (2).webp2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff698546f8,0x7fff69854708,0x7fff698547183⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:83⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:13⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:13⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:13⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:13⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3736 /prefetch:83⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3736 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:13⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10679491271564391991,1103365191624166870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5228 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
5KB
MD509a3ffc1f5bff115f929aea93d6ce6ae
SHA14345b80ffb042a04c52a91c680a990b276a9e4ff
SHA256e5e2b064c060a7a0a8ef66a0d0c2db72db086680d75dcb6eb9433eb4ab238ccb
SHA5129bd56edc66d2d17b2ef3187c6d1ee9b308b8156ff78d6abd71f2402bd0f2a593619ad334cd95ce9530eca534c5c546663607d59eb4774a8d0abeec4a2ff5f1a7
-
Filesize
5KB
MD5e182703a5b856c851c8a9f4bf06117ac
SHA1b5f913bb5243609c8cd20eca849a9c252aa6271d
SHA25693ff06df9fba40668caeda14e16fe8a9f2250c4ebaca94822b1807d5b6dcb44f
SHA51282fabe1ad9fa79e517f8d5b425384a95408b1df7bb724ac6519402b4262cdb76cda2f1c7f7e373f962a410812dc736d3a35a0a9adc005a52b1a9c1144d957d47
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f6e48d03-0a11-4e8a-a544-1069bfb72b6e.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
10KB
MD528e6131d3cea6b4ed521cee1ce8fa4fa
SHA11291b9a7588dcf877c42d01ecc53946b7a10a674
SHA25685eb28486f3e8314a4dc05f0c7f5c4bdf0647f93c27c7e805ad6d536f3f30350
SHA512d9edb63dd7eabeacd29cbfaefe9f043513011a0bf5da83c01e302586b2a312595d334634e5cec46208900cc550c79ad0d800698ad329cc7089b8abdd83d4be95
-
Filesize
10KB
MD5139c8cc58a3b0f337bf28b903a16ac7d
SHA1dd52492303ad56571694f0b1f5a69c2b1be8610c
SHA256d97fcbd607099fe027764f296a81681b3822fbd26de011e5dade29f70d445333
SHA5122def4bc6f342fedc2288eb188749110db86fb4acca945b40987bc879e953218d5bf80c595cee751f4d85169051ce2a595a474c0a717825d972f1c15a90ea8185