Analysis
-
max time kernel
112s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 09:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://carefree-sacmon.s3.us-west-2.amazonaws.com/jre.zip
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://carefree-sacmon.s3.us-west-2.amazonaws.com/jre.zip
Resource
win10v2004-20240226-en
General
-
Target
https://carefree-sacmon.s3.us-west-2.amazonaws.com/jre.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4200 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 396 msedge.exe 396 msedge.exe 1444 identity_helper.exe 1444 identity_helper.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 1296 396 msedge.exe 19 PID 396 wrote to memory of 1296 396 msedge.exe 19 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 4784 396 msedge.exe 88 PID 396 wrote to memory of 1840 396 msedge.exe 89 PID 396 wrote to memory of 1840 396 msedge.exe 89 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90 PID 396 wrote to memory of 4872 396 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://carefree-sacmon.s3.us-west-2.amazonaws.com/jre.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a0346f8,0x7ffa0a034708,0x7ffa0a0347182⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3484 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,13386023600098220459,5222346741645246617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4508
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_jre.zip\jre\jre1.8.0_341\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
6KB
MD528e2cd828d803d1573acbe3d66e7fc41
SHA1bf87e997a9950c243e8943f9cd2cc07629edad63
SHA2561aed0afbf1604572dddc045a39d89e800008d508c9ea5baf0f22fbf58baddbe7
SHA5125e1b82887a57a2ea4cff7daf8d04567325f3aa1ea658b6b35c9bcf7199903c87753ab2b224b66feba111abf26e7182695f241d5ffaf4b33fdd6920e4cfcdac75
-
Filesize
6KB
MD5318bbf385f03180314bcbde9e2a81970
SHA1e9deac0cbca8310d2c531e130243dfce3806d9d6
SHA25626a667a4b6ef8885d3b93b25b12c33a4a1672be79c99d7ec0084f7a0d8e7fc4a
SHA51291953e469682eb44a81b27b6833e83d433cc2c8dc5175ef1a44ca2371edaa39323c906a6abf2e4663ebe85ea8db8bfd08f1f3268c1f121fe46e08e7ff87195e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a44d5366e834c000b1c9eb439e3b96ba
SHA1cfbe322dff662158eded6dd98c42d328b4fe4b2c
SHA25605492fde25cc77ffc3873495d19a404cf42af1b4249bb489409630f0826a236b
SHA512d42687a9648a2d45b0c7f02eb8fb4a88a3fa3be90bc9f21193aad70754a058d8856dca0d8957227be928c5e0017723417af6847f1f6c1654c994ac24681a0fa2
-
Filesize
12KB
MD5b4aa930fceec5c39f3e08340d1444455
SHA124e9033fda84638b81d7a79d9e17d9245f7542d5
SHA2563208fa3fe5f7f36cbefc3c4eccf90c61e93752af54a380df253e65c699c1676a
SHA5129fbfcbc2ac48f7c36259247e852678272b3ed521191b660f8001511258c1a7fb70686406244a08d3bc4bdafe876bcb46a9e2ef7c8dbd99b4bfcec7f753d6bb6a
-
Filesize
30.1MB
MD5d7eece7763a3a73ac50af5d23784f078
SHA11c7539fd68f9cc9966f71247f28a1f89e24e94e9
SHA2564d853e336b51370265c7d9a8885b1bf049f5b3786c717107bfb8f8e7eb8faded
SHA512cedc03e85c35b5b6b58b022fdcadb636100e201b2920d19f2115bed7bce003e61f2a687368f3e91ffc9ac2790ab61250aeba66ba50cbca9b31576971e03a3689