Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21cfedb544d49fad5d9e7cc2300ab2fa.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
21cfedb544d49fad5d9e7cc2300ab2fa.exe
-
Size
1.3MB
-
MD5
21cfedb544d49fad5d9e7cc2300ab2fa
-
SHA1
e351461217b84091205e26239e40802472e9f099
-
SHA256
79bbf1f947c3c4c1e8804ececec5dfaa2229c3d65033c0dcf37fd3157a9622cb
-
SHA512
7710f23e42f10adbbc3a1c9fc6f86a02581efc7b2cec879ce38c8957cedfd4912e1b9828103bb78c1dafe674d3b96db7f1aa328376e4e67e3183d223ebc718be
-
SSDEEP
12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistC:U/eDNAuaE6tiJ
Malware Config
Signatures
-
Downloads MZ/PE file
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 21cfedb544d49fad5d9e7cc2300ab2fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 41965.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 1320 identity_helper.exe 1320 identity_helper.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 816 21cfedb544d49fad5d9e7cc2300ab2fa.exe 816 21cfedb544d49fad5d9e7cc2300ab2fa.exe 816 21cfedb544d49fad5d9e7cc2300ab2fa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 3748 816 21cfedb544d49fad5d9e7cc2300ab2fa.exe 30 PID 816 wrote to memory of 3748 816 21cfedb544d49fad5d9e7cc2300ab2fa.exe 30 PID 3748 wrote to memory of 5072 3748 msedge.exe 29 PID 3748 wrote to memory of 5072 3748 msedge.exe 29 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 3064 3748 msedge.exe 43 PID 3748 wrote to memory of 5008 3748 msedge.exe 42 PID 3748 wrote to memory of 5008 3748 msedge.exe 42 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35 PID 3748 wrote to memory of 468 3748 msedge.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cfedb544d49fad5d9e7cc2300ab2fa.exe"C:\Users\Admin\AppData\Local\Temp\21cfedb544d49fad5d9e7cc2300ab2fa.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bigfishgames.com/download-games/876/masterofdefense/download.html?afcode=af628d3a27a22⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:83⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:13⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5204 /prefetch:83⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:13⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6340 /prefetch:83⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:13⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14194403592710712991,2708360932300040745,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffca1c146f8,0x7ffca1c14708,0x7ffca1c147181⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140