Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
5abdf53c7079848311d96eb4f805abe2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5abdf53c7079848311d96eb4f805abe2.exe
Resource
win10v2004-20231215-en
General
-
Target
5abdf53c7079848311d96eb4f805abe2.exe
-
Size
645KB
-
MD5
5abdf53c7079848311d96eb4f805abe2
-
SHA1
f0c8d3fef9064ac94e3ce98139baf594a1e0a623
-
SHA256
e78859d0bd412b5f77d5e98fbd9674417645a04d5032e149715840682526e70f
-
SHA512
45023d96f23087e683907cf6dc3231a84e4679fb7220ebf1efff891162969c5721318ba2a4aace94bb1331e8d8fd7087eef58fafdf905339f80159ecb981f773
-
SSDEEP
12288:TKuqr9cjVMTww0w7C6Vkueirq0NhFZVZA85VXHVj7y:TKv92Vn+TeAq0JZX5VXH9+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5abdf53c7079848311d96eb4f805abe2.exe -
Executes dropped EXE 1 IoCs
pid Process 4004 n1s.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 2248 msedge.exe 2248 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4004 4192 5abdf53c7079848311d96eb4f805abe2.exe 93 PID 4192 wrote to memory of 4004 4192 5abdf53c7079848311d96eb4f805abe2.exe 93 PID 4192 wrote to memory of 4004 4192 5abdf53c7079848311d96eb4f805abe2.exe 93 PID 4004 wrote to memory of 2248 4004 n1s.exe 99 PID 4004 wrote to memory of 2248 4004 n1s.exe 99 PID 2248 wrote to memory of 3304 2248 msedge.exe 100 PID 2248 wrote to memory of 3304 2248 msedge.exe 100 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4304 2248 msedge.exe 103 PID 2248 wrote to memory of 4732 2248 msedge.exe 104 PID 2248 wrote to memory of 4732 2248 msedge.exe 104 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105 PID 2248 wrote to memory of 4844 2248 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5abdf53c7079848311d96eb4f805abe2.exe"C:\Users\Admin\AppData\Local\Temp\5abdf53c7079848311d96eb4f805abe2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\n1s.exe"C:\Users\Admin\AppData\Local\Temp\n1s.exe" "C:\Users\Admin\AppData\Local\Temp\5abdf53c7079848311d96eb4f805abe2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.nch.com.au/vrs/versions.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbe81446f8,0x7ffbe8144708,0x7ffbe81447184⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:24⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:84⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:14⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:14⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:84⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:14⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:14⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:14⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:14⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,8042480041111751497,14037566822349029757,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e318446015754fd04b1aa93d5091864c
SHA1ba15ce6661fb16372342a28e516c7d42d44c32e8
SHA25604b6c13f3be78863104ee931e905c9909d223246b59fa23d21da4646095c0646
SHA5129ebb0db3b4983ff69117bd24f46d17d1d4c4f0aef48398914eba25b022bece04803e0b5063ba4de810e3ea3bc6fb9b8a5c77b620187c27160be8c033613c78d9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD517f124471665561b473a2013488d82be
SHA1bc25b67c717805f9a5c736f8e9f6414c877a7eb8
SHA256c6c1d2cc651e0bda09dd0325a75ab78355288703e8e126645dc8a4088531a1a1
SHA512e2d078f3eb9d943bed63834cfc77225856ca2fbbd65abbae3f22a22aa290d308e8317ed47c5aedaebd80489ecc495f553e5635855cbb8f2508a03e129dee760a
-
Filesize
5KB
MD535a609289ade8092aa0131eedb92ba31
SHA1f803b48ec07d0376752646c744cb1c64c62bb97f
SHA256df7ea74e1a1b51a4435121b9667be8a5d03e9c8d818eef9e23883e111e019d61
SHA512545ee9b4220690fca90b8f313618da56358927c6e3ed618d1cdd30572623a449af1249c58fd56202ef528ef263f7c195d06f8f9b16e5f08b63b4e4a82c77cacd
-
Filesize
6KB
MD5392a263daf534ec027eca37169df9b58
SHA14b3e56f73df7306c2a51e546ea0d6dd47ed06567
SHA256cc94c61e329668be74277b16be76bb09c1c895033277c9b1a05b2d84d509625e
SHA512cf43d337dc3d40e1af93c946722cb16dd210b13506a82f6e6732d4eafae1834a840bedf894a77f7507df494dcf18175d8a90c7e81493a08ed9494f3b50656cfb
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f74e092ecda03b354e4cbb6d96f49b8a
SHA161abd8d0c8087f225ba487e7fb9d3863a782b969
SHA256af8fc36f1373a3f5af9ba6ef5513d3b234da52a374e09122b59c3f643e31799f
SHA512921e5b32d04484fa2ff35343ec1ffb904384acc0bebc5c4ec8b0d4b38c2e7d16f61f56d288faba25738712e65814bd137b5ecfea9010a5087488087f93ad0aa9
-
Filesize
11KB
MD51af891a5afb7a9b1fd7e3e82d59e5305
SHA1c8a49870f8823d0505b5f6040075e2aaf7c3985c
SHA256963f03130a1ba305ecf9aeee66279db5ec72542b2ccc3f2a7f808bd8fc5f1460
SHA512e46f22fdde1e8328ff7901b64579df3f07e6ed76ceab26894e64455bf1eebf03386976d403ebe9e38699d8f2102fc9bf99586388ee62bb45cf1d315d9edcb0e4
-
Filesize
1.4MB
MD52365e586c7316aa643076e91269b46ad
SHA10cbcd84fd0c73b49a9d6b345182bf71262de4d72
SHA25670d7b6aee8478eddef9191c5c32cafdf0ff055a877075e1d5e0b6cf982d2a6d5
SHA512537c7c3f5668a2650307774e3806d3d60157ec5e2aea314a2c3bbf430190f840a82447c95be712522c253a9fb6f250bb456a82262823e789a58ffc7649f9288b