Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 16:26

General

  • Target

    ef1b9135e8a243a505f5d3028d71a922.exe

  • Size

    11.3MB

  • MD5

    ef1b9135e8a243a505f5d3028d71a922

  • SHA1

    c947a5c43b86c448ab98729a8059b53cfca83b3b

  • SHA256

    935f60791863769c64b601ffd195d74ebfb84894fba303b3847d11b762ff8cf5

  • SHA512

    5b791ca1477633e2c73f457d854bda964e478546c22aa8e527b737c0d47c1be282db7c3d1d03e3590e5603488d419a01c127afc62b296771d9ed2bb44a1b16c2

  • SSDEEP

    196608:SbPk5HyC8k5h/wDdEoNiV4I/WWwA7mFMgWbPk5HyC8k5h/wDdEoNiV4I/WWwA7mK:SbPk5HPhJCFMgWbPk5HPhJCFMgsbPk56

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef1b9135e8a243a505f5d3028d71a922.exe
    "C:\Users\Admin\AppData\Local\Temp\ef1b9135e8a243a505f5d3028d71a922.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\exc.exe
      "C:\exc.exe"
      2⤵
      • Executes dropped EXE
      PID:4568
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70f746f8,0x7ffd70f74708,0x7ffd70f74718
        3⤵
          PID:4940
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1912
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
          3⤵
            PID:728
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
            3⤵
              PID:3472
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
              3⤵
                PID:3152
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                3⤵
                  PID:1064
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                  3⤵
                    PID:5448
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                    3⤵
                      PID:5588
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5604
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                      3⤵
                        PID:5720
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:1
                        3⤵
                          PID:5712
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                          3⤵
                            PID:5932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                            3⤵
                              PID:5924
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:1
                              3⤵
                                PID:5828
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:1
                                3⤵
                                  PID:1144
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14042908556344432338,11432972805899630069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                                  3⤵
                                    PID:2632
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/
                                  2⤵
                                    PID:4564
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70f746f8,0x7ffd70f74708,0x7ffd70f74718
                                      3⤵
                                        PID:4052
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3260
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5200

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        84381d71cf667d9a138ea03b3283aea5

                                        SHA1

                                        33dfc8a32806beaaafaec25850b217c856ce6c7b

                                        SHA256

                                        32dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424

                                        SHA512

                                        469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        111B

                                        MD5

                                        285252a2f6327d41eab203dc2f402c67

                                        SHA1

                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                        SHA256

                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                        SHA512

                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        5a4bfe0ec3dd83ae5c91d8b036110cc9

                                        SHA1

                                        17a2812e70d2b391e283d3c6901c49878c3b3925

                                        SHA256

                                        653631f129c0eea8e6a727ae984dbf8f99e2d7a683f3901b4d4a278d702d2d16

                                        SHA512

                                        ca1662610c9284a3c4c782ff8ea972130afa38ebcb353d0a708559e17ce2be838ee6e525fa6bb92ca8036830ae0d70ab42371c0ea84b5f76a8712d47d2359e6b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        7468b55f8ef7df6b9ba4a78ca2b0ee3f

                                        SHA1

                                        3415f07f47b1e6abfebcbdcee079c71a7abace6b

                                        SHA256

                                        395397060bc033b7efe5c6cc8153fe7a5c526d53140fd8c56f05ffecbeb32962

                                        SHA512

                                        851aa44b3b0e0349aacd7df8383ab045f9e8d8dc3b75ba1f4badadd001c78b4e8130a98dd16d2d380e116b23feef42c976d7e691b9c5c8f140f3090d78f06e9b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                        Filesize

                                        24KB

                                        MD5

                                        35f77ec6332f541cd8469e0d77af0959

                                        SHA1

                                        abaec73284cee460025c6fcbe3b4d9b6c00f628c

                                        SHA256

                                        f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7

                                        SHA512

                                        e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        66372140514fdd04dec78c786fb675dc

                                        SHA1

                                        d18b03274ecd7ed9bb2d9482a73379b63bb1327a

                                        SHA256

                                        831678ad9d7cbe77ddd7b27cd78ba5c764558053cf33e64c6fe7e68d149d41c5

                                        SHA512

                                        d2f454df36931cb47c2d25c8b36c30ba2057d652ae67635109f542dc9a1afefda01457c7789b3f563209f9db007e238b94d9a69604d2d20c31591b60e094a6d4

                                      • C:\Windows\setupact.log

                                        Filesize

                                        28KB

                                        MD5

                                        3e22ca67984823dae153b8137366b455

                                        SHA1

                                        91be4bab9fe866bb9ded21798c1092cfdc25ef80

                                        SHA256

                                        9fb945dd0c6fed6bd134abb3766be267a7c2b0a1bac1d98cb018e820f08d2bea

                                        SHA512

                                        add16a93662a788c5271a0ed420f284e5102363b80a3e0a5d0d75a71818389462568f8ac371866d81dfbdc0bdbaea5573ec60609ce42a53c5897977cd8a6bf86

                                      • C:\exc.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        ca5ddff56a22e0f00b77244fb338826a

                                        SHA1

                                        b85581c6c30c8039b92da544cfb0e4ad4b86562a

                                        SHA256

                                        cf4f7620663e06ec89c0993ea83d2275c96c0878daf19285e59f3f645ad8ada4

                                        SHA512

                                        5245c20ddee411e05cfeef65114cf42d024b3dd32a1b3adf5a0c25f83a489398788bc18489f8cecc077ee186fca99b19a7ff1141907af9aabd162867ab7123c7

                                      • C:\exc.exe

                                        Filesize

                                        112KB

                                        MD5

                                        9c563d3ccea7e31207f2edc6e1705e91

                                        SHA1

                                        83796fdcdb307cf3916fa7563def0d409de83518

                                        SHA256

                                        3bb025417e7a365e7c3db3ba65ce6e4e1019205c0b513b089e470f5a15eacf46

                                        SHA512

                                        02b4941795dc4598791671f7fbe5e6d1cfd262683a4b49774081034269a05ff7fed086ad551d939e8836a36d316cc73038e3df5b929d7f25afef80233cec5db8

                                      • memory/2304-10-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-112-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-111-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-25-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-24-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-578-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-785-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2304-1202-0x0000000000400000-0x0000000000407000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/4568-9-0x0000000000400000-0x00000000007C6000-memory.dmp

                                        Filesize

                                        3.8MB

                                      • memory/4568-8-0x0000000000400000-0x00000000007C6000-memory.dmp

                                        Filesize

                                        3.8MB

                                      • memory/4568-7-0x0000000000400000-0x00000000007C6000-memory.dmp

                                        Filesize

                                        3.8MB