Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
500a5dcae2ff976c13b7091a55960c45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
500a5dcae2ff976c13b7091a55960c45.exe
Resource
win10v2004-20231215-en
General
-
Target
500a5dcae2ff976c13b7091a55960c45.exe
-
Size
370KB
-
MD5
500a5dcae2ff976c13b7091a55960c45
-
SHA1
9a653d879225ccf684a769e50ecd42b93f2cb1de
-
SHA256
5239a68a9f7abe5deccb76fc7d8a06b777d6682321757566c6e2727c5cccdf64
-
SHA512
f2623005c88cc66b8c980d90d19eb5d604b8138edfbf971810dca6dccf077e0f92aa8bafe2de41c0694b062099f4480dc240f077806dafaa212b970db6c37dbe
-
SSDEEP
6144:fEzJVF0O7rxqph4s8stC31iXfWCnIV0wTyiR4oiMG1PunCovelAq46Zyl:OJ/0O7rApys7RukIV0S5GBunCoSAq466
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3456 msedge.exe 3456 msedge.exe 4604 identity_helper.exe 4604 identity_helper.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3456 4556 500a5dcae2ff976c13b7091a55960c45.exe 90 PID 4556 wrote to memory of 3456 4556 500a5dcae2ff976c13b7091a55960c45.exe 90 PID 3456 wrote to memory of 1172 3456 msedge.exe 91 PID 3456 wrote to memory of 1172 3456 msedge.exe 91 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 4832 3456 msedge.exe 94 PID 3456 wrote to memory of 3744 3456 msedge.exe 93 PID 3456 wrote to memory of 3744 3456 msedge.exe 93 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95 PID 3456 wrote to memory of 5100 3456 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\500a5dcae2ff976c13b7091a55960c45.exe"C:\Users\Admin\AppData\Local\Temp\500a5dcae2ff976c13b7091a55960c45.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.oiloja.com.br/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe3d446f8,0x7ffbe3d44708,0x7ffbe3d447183⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:83⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:83⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:13⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:13⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:13⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:13⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13198426053962903355,11105493776779795782,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5eaf1e60f26e563c42fe059ee69727467
SHA18e736b07fa2d2852548844a22e24fff1d92224bb
SHA256aa93c8bfc2b3ab58f179c3467ffee838dca7da36385633b2250401de266544a5
SHA5128877e4c17c874c9510bb9c5d8f368d6a4dcd05a2dae333603478e7cb8f1b0e35a9d47795cb3c5fb3241984032328f489b533496cf2e175215cb3a78874e238be
-
Filesize
5KB
MD5e11569b9f5297c672af5860b9c48b7be
SHA1fa9e0b27824fb838fde3b61220bae15ce4d4d739
SHA25685df44b310f1513fcb04c5fcd0a33009ad8dd071f76ce775ad2a5129c542f508
SHA51220a7a573a11ac001015567e5dafd3052b076fab35c887630fc1f70bd3c9a65016919d226d1e4a04719435e7f2386666f06388857603ae3b2c005aa48ce303d7f
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50cdd3c7b273aa0d0e4426626ffa68e49
SHA161efb81e513a911b3e6412f3cba28aa56e08898b
SHA256e04892b950cd0e9a83c2ec4f59dd493866b82751e57d52b9298a4a6964417d24
SHA5120e9de59f278df10d7cf93ebc7f300901627a9b004093347fb2ea102c9e1ba8a5fbbed34abbd26a62fd981b0d6ab56f7527490db4340f3c52337c5d76b24c5692