Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/02/2024, 15:47

General

  • Target

    Nouveau document texte.txt

  • Size

    76B

  • MD5

    8cbb5483765db903966c77908e33eed2

  • SHA1

    354ffaf98fbfccfcc28bd01d0f7750aa17451f00

  • SHA256

    10c33fb1bee390444430006c5274f928bbb45e87a944ff50fc33261d8453489a

  • SHA512

    b2e1fde4ef28067ede595480a969d4d5fe369dabd1215055a9bc9ea6990d0c5e30bbf3a751fffd57188ff1c5097d091063da2fc92a752a2137d832addfed82a4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Nouveau document texte.txt"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Nouveau document texte.txt
      2⤵
        PID:4080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:340
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc7db93cb8,0x7ffc7db93cc8,0x7ffc7db93cd8
        2⤵
          PID:4440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1688 /prefetch:2
          2⤵
            PID:872
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3852
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:8
            2⤵
              PID:1692
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              2⤵
                PID:3532
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                2⤵
                  PID:424
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:1
                  2⤵
                    PID:2316
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1
                    2⤵
                      PID:5080
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                      2⤵
                        PID:2976
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                        2⤵
                          PID:3044
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1
                          2⤵
                            PID:4640
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                            2⤵
                              PID:2056
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                              2⤵
                                PID:228
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:236
                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3676
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3448 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2536
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4832 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3620
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2004
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2176
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:444
                                  • C:\Users\Admin\Documents\New folder\builder.exe
                                    "C:\Users\Admin\Documents\New folder\builder.exe"
                                    1⤵
                                      PID:1468

                                    Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            0bed556ffeb1e69835b408d733b041f0

                                            SHA1

                                            e2aec94abd489a26f36a9694c7ef3903af6409b6

                                            SHA256

                                            7d60b9117a935eaba25d7273a5b5e8ba04ece22672661ecb37a3c8a08f61def3

                                            SHA512

                                            47d492a7c72f9d12511f070d7d28451b1c52c5f0d446890e704b02bbc51330b1890c5ac4e050d514ff1bfd9c64421adeebee114718042af5aee3f5fdfb413fc8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6b704856-f6ea-4b50-9831-843843445ec2.tmp

                                            Filesize

                                            335B

                                            MD5

                                            bd6ad1e41587fef93b83b1cb2ff45356

                                            SHA1

                                            774b417752e7287e2b69406126541d5e75145561

                                            SHA256

                                            1dc7b2a82f7866582fa5ea332d5cce18ff2b266828c7f44ce5727185531d2d35

                                            SHA512

                                            d304887123a07d7f3c55554e8f7c800a0580d0919442f235d4e8c718c5fe16720eb6e9776449cef895fc0f3ea82491a713ed2464eab92d8274c9a7f262ebfdce

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            4KB

                                            MD5

                                            ff3e865386ee5384a2641f1dedbffb4f

                                            SHA1

                                            cb059254e6752dfe88b540f3581df40315097927

                                            SHA256

                                            2ee9be7d89c4444d1390b6a00820c7ddd19ffa21fccf4d05749f03eca58d5277

                                            SHA512

                                            9e82976b745e6430340d77716b271a6b533e724c473da6ecea913bff7337723f17f092bfcfd895dc8c39c4c74c3e5ef267d158eb270995095657d7f986d8196c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            3135781642eefc70df58aa620c415496

                                            SHA1

                                            656924519c843c0bde4a01fa4a9aa0d8e473e949

                                            SHA256

                                            3cdab9d8d275140cb096570acd3e44ac1abe6994f1851f4cc8a1fc2c316795b1

                                            SHA512

                                            919af99ba9c3b7ca22b3c7cc44b9bfc54b148de2fa5a00aa7be90fade3f36fda51fe045a3d949cd04dabf4b3f2fc3dedfe31ffc6df6af9f45851d8d9700faf92

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            b90509e0f82af7f97206eac02b8e8b0d

                                            SHA1

                                            347624474eb98144e68cd8b389269b3749c911f6

                                            SHA256

                                            7f4f51e47728da60f6a40bf03164d6e44311af03d10cfda51be648daec17aeb4

                                            SHA512

                                            b7013970baf71245f1d3676e450e2f89459d5b91b6b496bb868656a1b5858df452f80c899c66583986317c0afcb91fb16bff0ee70f60ccea37fdfd192a95b4da

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            68e0ec0b78380269d928a47b1ac96d73

                                            SHA1

                                            6149ce10793cdc6cdc37111d60e8aa05a4ab2553

                                            SHA256

                                            2c827a1b2192a78df36fd6dac16e941c30498b243dae2b70e63a0f8d71fca4f9

                                            SHA512

                                            069b66e613f861d0c4ae72ae969aeb7758a2fbcd4147bbb9817907f3d75baa4b82a2448555a8d02f5cf761457a5fa7fdb57196745728cf85dfd72ba6f07ed3fd

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            25KB

                                            MD5

                                            5e1542ec05a1840cfb56ae87d1c2e16e

                                            SHA1

                                            25bdd95b83b7c614a6446609cff6ecbcab58d9d8

                                            SHA256

                                            41acd6ffea81ff1b8b58a4693696a397817473eb899edbf6606314820a8e40b8

                                            SHA512

                                            12c32368cbedc3d2515907ab740c75022fc4eaecec9b45734f346db0df209e667b066b2fcd891e84193868ecec8b892e7b484c66a8b329562bad53a69b25c0db

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            783df0a5152a05ef7a4dcc5881a4f766

                                            SHA1

                                            9f2402a14f95256c8a02812e104939239379705b

                                            SHA256

                                            0b0468a5a50c514686eb34e3a50be1bd9bc5086132bcbe373469547bd5115229

                                            SHA512

                                            4b3a01a0b7e33eedefad5dd9eaad4577be23604e55f5d962d1628340a5830c99b0a23498bdef72a8112c2346432534809a4c1c297090a03ce7c09d85f802b377

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            45e3a9220a9d72824ec82e7e815b8b4d

                                            SHA1

                                            c68e2f17670a4a7bdf365df917f9f56a0f4eecf5

                                            SHA256

                                            762bc5a7ddb6c6fcbef179d1b652280bcd0f7f0d3fee88df184f3aba2c9a2ac5

                                            SHA512

                                            65c2fb6c452e7432c182fa5bc2392e775a49e55ad2730da02290b4d84801e65f92865beec3c1184c10bc50733248b08c4bbc714835f71fcf2480ed6268a5786a

                                          • C:\Users\Admin\Downloads\release.zip

                                            Filesize

                                            445KB

                                            MD5

                                            06a4fcd5eb3a39d7f50a0709de9900db

                                            SHA1

                                            50d089e915f69313a5187569cda4e6dec2d55ca7

                                            SHA256

                                            c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97

                                            SHA512

                                            75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b

                                          • memory/1468-100-0x0000000074380000-0x0000000074B31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/1468-102-0x00000000053D0000-0x0000000005462000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/1468-103-0x0000000005360000-0x0000000005370000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1468-104-0x0000000005490000-0x000000000549A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1468-114-0x0000000074380000-0x0000000074B31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/1468-115-0x0000000005360000-0x0000000005370000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1468-101-0x0000000005A80000-0x0000000006026000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/1468-99-0x0000000000930000-0x0000000000938000-memory.dmp

                                            Filesize

                                            32KB