Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 15:56

General

  • Target

    048d23c091ee83a7d68ee6f5b1627a02.exe

  • Size

    63KB

  • MD5

    048d23c091ee83a7d68ee6f5b1627a02

  • SHA1

    c038056134c96a730bcca63179ea8b472b35674b

  • SHA256

    e790770cd02eb7508fa58aba683cda00fdffabdc6b4b9d75497db871b24c17fa

  • SHA512

    ef9c5199f0cb27b4de14574f20354715f223c7c628552bfeecd9c3ec469ac03707c16ab425a733d47ed13490fac2ef43fe5003c66f94d37b80c4d994809fcad2

  • SSDEEP

    1536:hUiudwBp3CyM8HsWmJbL+Z/4gta2UdhbMbqh/nNrcS1nU:hRnLy8MWmJ3+Kdhb9/NrcEU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\048d23c091ee83a7d68ee6f5b1627a02.exe
    "C:\Users\Admin\AppData\Local\Temp\048d23c091ee83a7d68ee6f5b1627a02.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.360.cn/360safeuninstall.html
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3252
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3b8846f8,0x7ffe3b884708,0x7ffe3b884718
          4⤵
            PID:408
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
            4⤵
              PID:4468
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3652
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
              4⤵
                PID:4920
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                4⤵
                  PID:848
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                  4⤵
                    PID:536
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:8
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1772
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:8
                    4⤵
                      PID:344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                      4⤵
                        PID:1828
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
                        4⤵
                          PID:4488
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                          4⤵
                            PID:4916
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1
                            4⤵
                              PID:3132
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1871404352992489368,8789718459876021774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 /prefetch:2
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1032
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1844
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3680
                          • C:\Windows\system32\BackgroundTransferHost.exe
                            "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                            1⤵
                              PID:4488

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              bcaf436ee5fed204f08c14d7517436eb

                              SHA1

                              637817252f1e2ab00275cd5b5a285a22980295ff

                              SHA256

                              de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120

                              SHA512

                              7e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              192B

                              MD5

                              4179fa2f1fcd1df84ea9ccf7cbf55d3a

                              SHA1

                              03548472ebb497d07e874d5330322e346099bf8e

                              SHA256

                              26ddcf4aebc2c0336449419abe0b6717b76f8669a864ebf2ace60f7ec2a1ceb1

                              SHA512

                              219db3196483055437c0ee8482f472d0c6d0d7d2cfd1ca3a1fbfe42060b77c981ec4d99e8bcc68610e54d15c0e03c80fa990285865532a1397aabb2b769fccae

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              285252a2f6327d41eab203dc2f402c67

                              SHA1

                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                              SHA256

                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                              SHA512

                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              ff81ea9e28d021d580778c5ed8643e28

                              SHA1

                              0f82eec308f7434dfc3ca46e67574f32456c7cef

                              SHA256

                              db9a9189071f373ea129c64124246ef6a2959ccdec3a3049860d79480743a15b

                              SHA512

                              f07d541b6e7f6902edd0a8ba1400b96e86e2f5f841ef045c3cea06842e14c13e768d076087de399a31948b47424f62ec4832e37a4eed7e1835edff3e478fd82d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              5753e47926e92762078b38a31071fc3a

                              SHA1

                              4cd20e089cc283d31a5130bbf42dc3aeb805408d

                              SHA256

                              08f420f88426b783c6bb78018095305a9127e698a76c29919f91382a6dd11bae

                              SHA512

                              1a12052b7f90295f840917471734d7be91b7260fb5297c6695773571e6088bf9dd2ac473c7eae3eb9b2892e38b0c1611075db416db9b77d0a8ecd5156bddd635

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              2cb5575e8c92f2d0d597d5f0aedc56c2

                              SHA1

                              f2a7c956814a908274b3e439565292503ab2788e

                              SHA256

                              ee520b7fb79efaecb9180b7aaa2025d77b3b31aafc1c2b95c418cb7a83d89259

                              SHA512

                              54cbae12bf66a9046a623cb2dd2dcd95d0d50f4538e8e6b6a9189cfb92f1ab3e39c89572d5ef3e11a4d6f3aa8296d7ce680ff9e58f8faae043f75442e19904dd

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              b0ba6f0eee8f998b4d78bc4934f5fd17

                              SHA1

                              589653d624de363d3e8869c169441b143c1f39ad

                              SHA256

                              4b5ee509e727accbd11493dda2c1d512e7dbfaff66c4f5f7ea9c2d2ccd06151f

                              SHA512

                              e9a165da246c6b80fc38431538203cf03f95794184ff63f00c9500f8919a2028b803f64b670e685185eed72df0509e3185c9b434fdbf2bc7af36021d46bd08d9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              ecc46a4375c0ccc48815be6bc8dfb566

                              SHA1

                              2c48e80e7e759100be57e38129959f9dfe08d771

                              SHA256

                              1d4bd128aa9bfd07739dc62b08eaa7ef0950c6e03028d63fd90dba71681b5df8

                              SHA512

                              e2b3ba90ecac0ae4932d8dfce77070e6a2a9bcf8b88e171b5dba50efd278f72e159a7497bb57471465f8ee4199a2f6e6751fe27a3e1bf0771fd41fec734332b5

                            • C:\Users\Admin\AppData\Local\Temp\nsl4827.tmp\InstallOptions.dll

                              Filesize

                              14KB

                              MD5

                              32aa6334fc543e70ef0f792bb9a0c45a

                              SHA1

                              54be1f5004f7e5afe7c9ba160495076ea2a4d60c

                              SHA256

                              610e54bcfc2831d4f9d7030ceb16d35ee33006403d842f01b6e75bebea0083e2

                              SHA512

                              ac92116821a032de8df64bf9aea9c6ba4040467eebaa4e028c2bf031f1c81bb69531288b9d89d951b952fe0b4ecccade874a5ae76d04db8b4dee2d13c486f9ae

                            • C:\Users\Admin\AppData\Local\Temp\nsl4827.tmp\System.dll

                              Filesize

                              10KB

                              MD5

                              7d85b1f619a3023cc693a88f040826d2

                              SHA1

                              09f5d32f8143e7e0d9270430708db1b9fc8871a8

                              SHA256

                              dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

                              SHA512

                              5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

                            • C:\Users\Admin\AppData\Local\Temp\nsl4827.tmp\ioSpecial.ini

                              Filesize

                              738B

                              MD5

                              9fc2be888acc1a17298d71bddc9b248c

                              SHA1

                              0f98c96b6162a7eaa32803c68cbe5e519036cedb

                              SHA256

                              efefde58e48278f42498231e5bf1a4a6cfa88d1262e7409b74a939fdd188ce77

                              SHA512

                              8922feb8b173641a1367ca4ef58163f3f2752b2b04114546fb8e6e2ac33477d95ed5730dac4fc696eae69e96c3a5827ec182232086506de9a52fee61ec5dcded

                            • C:\Users\Admin\AppData\Local\Temp\nsl4827.tmp\ioSpecial.ini

                              Filesize

                              673B

                              MD5

                              e7ec3c48440d85de7da71a46b47a3452

                              SHA1

                              a43500b752befe0c3dcab0386b78c97442b01409

                              SHA256

                              76e04265c91726e7ccd0659125a4827039b4ca21fabbc0b361261a01730c4b87

                              SHA512

                              0a3962ec2e7e8ecf4fc7a2ec095989f66499376bd9062271f3cc14fc9ccaa17c8e5b0c82a9038dd15ef78ca9adecc5e4864339e98d87defa209800919f590097

                            • C:\Users\Admin\AppData\Local\Temp\nsl4827.tmp\nsplugin.dll

                              Filesize

                              6KB

                              MD5

                              acc679678d96982a5b24ad684c3bbdaf

                              SHA1

                              3e87481eb16096b4078f29f887908a946ef11546

                              SHA256

                              ab969cacf16163e73ac5b2971c9502a27c3b1ab7b6b0cba3a48313bf9bee6e3a

                              SHA512

                              47d154679fa663267f97da0ea758ff3d7032f334086d0e9d9674b2273bc06ee8e5426ae9980616588643b433aa660cdd5d60754582532b379d4ac7009c7062dc

                            • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

                              Filesize

                              63KB

                              MD5

                              048d23c091ee83a7d68ee6f5b1627a02

                              SHA1

                              c038056134c96a730bcca63179ea8b472b35674b

                              SHA256

                              e790770cd02eb7508fa58aba683cda00fdffabdc6b4b9d75497db871b24c17fa

                              SHA512

                              ef9c5199f0cb27b4de14574f20354715f223c7c628552bfeecd9c3ec469ac03707c16ab425a733d47ed13490fac2ef43fe5003c66f94d37b80c4d994809fcad2