Analysis
-
max time kernel
256s -
max time network
280s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-02-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
fnuuy.zip
Resource
win11-20240221-en
General
-
Target
fnuuy.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 3816 msedge.exe 3816 msedge.exe 1524 msedge.exe 1524 msedge.exe 4560 identity_helper.exe 4560 identity_helper.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3816 wrote to memory of 4780 3816 msedge.exe 88 PID 3816 wrote to memory of 4780 3816 msedge.exe 88 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4840 3816 msedge.exe 90 PID 3816 wrote to memory of 4972 3816 msedge.exe 89 PID 3816 wrote to memory of 4972 3816 msedge.exe 89 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91 PID 3816 wrote to memory of 3440 3816 msedge.exe 91
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\fnuuy.zip1⤵PID:1648
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff855d73cb8,0x7ff855d73cc8,0x7ff855d73cd82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,17937500339114842696,9348787333857435164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD52a6f3a18edede2748f23bf70d65ed465
SHA1ea226971d6dc3329c1605f6695b8aba322457293
SHA256cfeb2561b6cddfdc6675e8dbf2972a3788659919b33e1d1880904af58ab39157
SHA5127b87339158cb67b5b027351e141d57d36f220d53fd5dbc4475dd312b2a1f7d4051cc76ff46d16aff038b5acc2f2dc0935253146f2c724f7f44be0bda9c7bec99
-
Filesize
6KB
MD5840bb6185ef50ad522ef77ab28c9d3ea
SHA1ce74d7584fe16830cddb8d3c81fe952cdaf0c176
SHA256293d27b0ea0b2a66a4f43c4a425c2263e0b8488849d8f70b609cbe73c65a7bdb
SHA51238c33e67d3a2a7a7c5c3858fc08cab3fe32563adf1dfdb9e1858c000b43125d991e44e388c26fa4c88616a88c3961ece9b58f69bace38297b815c9797b1ae282
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5297b900aabb11bc3d7245b7a86399365
SHA19432a35747126678912bd642b315c2bc7867d31b
SHA256eba665608b952cb64061dfddc1ed59b705cb28871c17a603824dcf5aff38d237
SHA5122dadd6b28d016fdf1e40771d27db4c3be2f2f1c8e786e205825489628ebef4496c0cc425f9f212a1000dc96b6bf6167c583297aec358cc867f778c6024d05a55
-
Filesize
11KB
MD5bb2a6b76c8199da8dc4fbd82d8e1bf5a
SHA128365df2953afc6b4c0b50fc3cefd94e7faeebc8
SHA2563d4b3be3565c7f63fa2e1b40076d6908efc94678b3abfa0a97f324910e463404
SHA5126720e9292f8ec6a863598da670d256fcfa577285867463e2f76e148b52a2f188ef72e7a857ab396354b1cb19971b1d7e93e4dfcfc31cd0400848237458379b80