Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Delta Executor PC.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Delta Executor PC.html
Resource
win10v2004-20231215-en
General
-
Target
Delta Executor PC.html
-
Size
4KB
-
MD5
9786fc2af40c593674cc8226c3d09ae9
-
SHA1
1f8342c59f3a6baceff2b2378bd595e3c1ae6998
-
SHA256
0de079dd9f11aace121f3b93205545d86372322e0e0de9b36e68f1d747cb94cf
-
SHA512
749ff789eaa1a44033475ccdf782c588f31a665a86ccf9a217779fdd31816b76f3c73babab673ab7fd941254025efad2c6b574ddbda98bf3842447b9deb29378
-
SSDEEP
48:8pyvQhNLYF6zjzblBeDPVos6AzTIQM1I1xIvIQIxIYnIcIfvILlI2IpTS3:8cqNL1PzbliPas6AzTpqCxGHydrcAl5l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 3252 msedge.exe 3252 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2624 3252 msedge.exe 84 PID 3252 wrote to memory of 2624 3252 msedge.exe 84 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 4976 3252 msedge.exe 85 PID 3252 wrote to memory of 1896 3252 msedge.exe 86 PID 3252 wrote to memory of 1896 3252 msedge.exe 86 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87 PID 3252 wrote to memory of 3784 3252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Delta Executor PC.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ff815b546f8,0x7ff815b54708,0x7ff815b547182⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16463165385789147893,5367875225809984416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
179B
MD5c2e55a5416c32d14d5b5dd46b3d03182
SHA172ae2c7f43ea8114d0466eba623f3b1d4dfee3fe
SHA25660eb0264d40715f9da53d7ec895bfd6c03d45af8e1391a159c24e19807744155
SHA512b38c572f15f2e0cd5b9654db6a891b719c5d0f4cb8049d4fe60fb95beccafdff178fc49af532ed364ca4b70af2357b11d9eb430fc40229ba31eab395c6e9ca9e
-
Filesize
5KB
MD55234596d3ce407563594084500433409
SHA12444e6cda5f634449af0c3b98dc62074748f6494
SHA25668be6a4d6df0480f1ac8c1d8a48fa8e6295515a73e5033ab0020ee7269c052ba
SHA5122a3d7cca3bbce1ea56379e3bd9cbac48160d6870d4998f0b7626c5566df790a868bb719d7b92e4db4c07ab7e8537d686adbe9c187ea5831e7a9fa28cc30ebc66
-
Filesize
5KB
MD510d12339dde51f0fb1b717c8011a3433
SHA193f252521220e22980ef82fe556967c0d15c567c
SHA2568c8f74fb53cefd9be3f114e37a5cc26246e325cdcbb48c01b9be503488eb211f
SHA512aaee35826c11e45189a457aa2989b6384aa3c887f5a2b0bdaee636a11f67acc4e5f44568abba54115766ea692cd2a0031ca4a391d3a92dd72e6bbf3aa1d0b245
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59c7342a383e1e4cdfc957ebfb674419a
SHA1541b6adc7bdc089cc785c645ffed4c255682d7b2
SHA2565e9b714ee86ba2b82e262bb74b1c4074d032c930c84f78dc8395c8ffd2741042
SHA512ddc695340420ca45e6abc902fffff9379ab2f58304de60a7e3feaa92db906cf974d573fe08fe65cbf6d48b94b178874c21a61b542d356c16f89ee4118e34f2ce