Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 20:30
Behavioral task
behavioral1
Sample
f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe
Resource
win7-20231215-en
General
-
Target
f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe
-
Size
1.9MB
-
MD5
0c575308d12c2194af27612e8b97a57e
-
SHA1
8e8a8898fdca9b49fcaae1a9870eaac49cee8c3a
-
SHA256
f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445
-
SHA512
8f5baf02016305c351c84adccd02dbe987e7707735f2fe54b6a3cb3dbc847c34fd572923dc308e16d9388eb564bc15c0c6aa66e662b6697df86c7e6658720959
-
SSDEEP
49152:e5At40lo54psW/WsdiyNIPVSIpgmTPkvFZV:e5MTC5Sv/WsgyC9/gdb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3888-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3888-56-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/3888-0-0x0000000000400000-0x0000000000889000-memory.dmp vmprotect behavioral2/memory/3888-1-0x0000000000400000-0x0000000000889000-memory.dmp vmprotect behavioral2/memory/3888-31-0x0000000000400000-0x0000000000889000-memory.dmp vmprotect behavioral2/memory/3888-60-0x0000000000400000-0x0000000000889000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 1092 msedge.exe 1092 msedge.exe 1120 msedge.exe 1120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1120 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 96 PID 3888 wrote to memory of 1120 3888 f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe 96 PID 1120 wrote to memory of 4052 1120 msedge.exe 97 PID 1120 wrote to memory of 4052 1120 msedge.exe 97 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 2924 1120 msedge.exe 100 PID 1120 wrote to memory of 1092 1120 msedge.exe 98 PID 1120 wrote to memory of 1092 1120 msedge.exe 98 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99 PID 1120 wrote to memory of 3008 1120 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe"C:\Users\Admin\AppData\Local\Temp\f8b626d638c4f7dad13330557c49b148a42a54e8d96da1767c6b413c653ec445.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.x5ch.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdaa8746f8,0x7ffdaa874708,0x7ffdaa8747183⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13126738761784615991,10317513232888889588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13126738761784615991,10317513232888889588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:83⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13126738761784615991,10317513232888889588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13126738761784615991,10317513232888889588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13126738761784615991,10317513232888889588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:2020
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57a5862a0ca86c0a4e8e0b30261858e1f
SHA1ee490d28e155806d255e0f17be72509be750bf97
SHA25692b4c004a9ec97ccf7a19955926982bac099f3b438cd46063bb9bf5ac7814a4b
SHA5120089df12ed908b4925ba838e07128987afe1c9235097b62855122a03ca6d34d7c75fe4c30e68581c946b77252e7edf1dd66481e20c0a9cccd37e0a4fe4f0a6fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD508d5d41f0f0cf57020d5a4ac0deea0b5
SHA1eabdf2f66439d2b902bbf28b2f6b943fa6b528c5
SHA25677006896914f4604287de4aab6d36dddfa74d8a9d4e5f8a3c7f2bb4a00fc2db9
SHA512870f579150ca47464d88bf634fc756f91f98ad5c173670d3cee6107b0a4f75ab65fe374b4d108177767daa48448d39e8ab7cf12f8dddbc05954a2bc8c1cfe86a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD572514b18d29c5995d31eced820c2deed
SHA18d36503fb4885381f20b907dde988b609641360a
SHA2569c79901dadb8ff8025a538c510af69616958be987c619c19d1fc8ea337f7b547
SHA5120308a1ccafe892567daf3d67e8814f8ee7b5f6b7a8598b1e8fdf61b1c660d44a6d2149d45d7451ef19693bb67c84c219517e81bdfb5ba4c76b8a35055b2dfabf
-
Filesize
485B
MD5bc7878c3a7633dbb73b538079e394bbc
SHA1bf279e5a0656bbdf52ea1dbcc6d720ee66b73078
SHA25695b71ff03069a9f2a1b47ff48a4d8a69e2e3171e125874ea23a517a00557f8ab
SHA512d040e6b95d11620608779e205ab502faa2eb99187527ee476ecfce8d85a1a1586de40d968c0731735d0baeaa421fe7d1ebf7c84f39e9ae2292ca81b286a6926f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b47544e03fca9974bee825cf8ef091b3
SHA107e2f68322ab94526abae7a4ee40698dda0ca832
SHA2569a34606c5a0532308ade8ae6e733b0af7fc900e077945ebfc7650a901b8343dc
SHA512ae2230e3752a85237758745ec8fe2afbb7435280dbab15e1c6ea5a5be7ef7a2e558ede4935fe10fade2357ddf5e34342a2e25d70de641b723ab808ba63ba69e4
-
Filesize
5KB
MD5ee283de829289c5e7e82e95e5e1b9b3d
SHA153b8f4ae9069e250dc23cbb366cb48bff99b4e4a
SHA256ec2cb3fcb9e10dd1e62d1bc0c2ce7ec57476a89dd53d2b1a505f43c7b2af56fe
SHA512bbed1acab81abbf1444c230dc1d2665d6d050c3a6d643d38bfda3929970f031076a2683f2a9b7046d9f2d55c754ac09e0c8736444b0d82aa1b7f2a5974a75f85
-
Filesize
5KB
MD5b86ef45b29ec8d8828e6537559144280
SHA1a2eda6e9e28c84a03dcf6846e8e109323a20de37
SHA256bb7383251ce4290c022bb873cc113d0d1f16d7e7ad0d9e6b80ed3b4ea55ae80c
SHA512cf0a534c21d15af56a1a6e1f0d680405104ecd23c5186ed35d3b800d66a52b46104357feab4f141e19312834258440744f1744e2bf0ca6b4abbb42e632895024
-
Filesize
24KB
MD552826cef6409f67b78148b75e442b5ea
SHA1a675db110aae767f5910511751cc3992cddcc393
SHA25698fc43994599573e7181c849e5865f23b4f05f85c1115dff53c58764d80373fb
SHA512f18df18cab6b5ecd71b79c81a2a1fdac42cc9960f62f06ac25f4d6487792705f2766ee3a10239eaac940d090186e6bc820e4eb7a5ee138f6e5c1c64f951b960c
-
Filesize
10KB
MD5e9f13c452e375b533273edd4fa5ba24d
SHA1a3e98eeef52dc614491dad4ace064f6b3ff3e052
SHA2569e54fd9283e12e45d0f3ce0fe29c367416bf3e2e996932d0394e29c7667551c9
SHA512c4ba20e45bf31476b0fa70a741f7f8bb5354375925c805eebddeb35f26ad80c72f0008a83abf802b87a83f4c8be3b317b2f97aa8cec88534110af46730c69063
-
Filesize
10KB
MD5f7b468f303f3f64c417d286ae1889c2e
SHA18dc1e4ae103560e28c046834e1404fe3feb8e351
SHA256ddda56f26c0e6fa711efaafb14dccc177dc1bda512cd6c7b0e706e5718d402d1
SHA512ccd51009f9688a0ee7a00b8940bd14ab72cafdaa716bc414802e9716f4e780c26849e429f1c2744439023bcfa966bb3716e8052c280168ef5c0c9743bba07509