Analysis
-
max time kernel
166s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
ProjectRuin-V1.3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ProjectRuin-V1.3.exe
Resource
win10v2004-20240226-en
General
-
Target
ProjectRuin-V1.3.exe
-
Size
9.3MB
-
MD5
cb65e33ecea6a827772c486e94257fbd
-
SHA1
e77354c6e0843ec568d0e65cbdf36cc3855f4486
-
SHA256
8190a98cc9fcfda9ae9e715c3b6b70c46e115d5678c9d23e139c77ff224b6316
-
SHA512
801f262bf79a883b16e121f885d0695885ca9489d73e641392a8be96bd6a119d675b26a38ba08d8bc8782f53a84c68836ff77933fdb3de2e26e086c4dcf83b88
-
SSDEEP
196608:UuLchpZqyN5P5EYRWzX2ziv6DdQFStNv130jqHDH2wSj6uhBf:UuLGpZqyf5PEqPDOSjv1dHDH2wMhB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 448 msedge.exe 448 msedge.exe 3092 msedge.exe 3092 msedge.exe 2996 identity_helper.exe 2996 identity_helper.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3092 3376 ProjectRuin-V1.3.exe 91 PID 3376 wrote to memory of 3092 3376 ProjectRuin-V1.3.exe 91 PID 3092 wrote to memory of 840 3092 msedge.exe 92 PID 3092 wrote to memory of 840 3092 msedge.exe 92 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 5064 3092 msedge.exe 93 PID 3092 wrote to memory of 448 3092 msedge.exe 94 PID 3092 wrote to memory of 448 3092 msedge.exe 94 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95 PID 3092 wrote to memory of 2412 3092 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ProjectRuin-V1.3.exe"C:\Users\Admin\AppData\Local\Temp\ProjectRuin-V1.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://java.com/download2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcee0246f8,0x7ffcee024708,0x7ffcee0247183⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2316 /prefetch:13⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:83⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:13⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:13⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13666637153107235661,12005916702256275357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD56849c388b30c13cdfdc18dc083cd9171
SHA1b7a98e13839f454cc5f1a341ec9ac769abb0764b
SHA2563539dd0f311cf075765181de6525cf3afc0e08a901b7c51ecbe16e349f51a4aa
SHA512c6a2dc3b7e76c03a1edd2cc9df34083f0a25575a40aac2c7a5e8838f095539517e7a634c9cedbdd12835a09adf9f00b09e191a20d11909883ff0cdd462934faa
-
Filesize
581B
MD5d71bc840ff2ce35ea1ebd22c082e3e4e
SHA18e51afc7d5a4a971c251d6fa1f63ef9fb42bebfa
SHA256e0af1fe9ac7c60d5eb62560c194a97ce1d5164df3c265f0aee306a9f4e4bf585
SHA512c8e8e1d9a5eb85e23ffdc722bb2d55f0de2718ea37c0e23149f6e98cddc49c226151881ee902f187cd4a7bb715ff74618f3077442743f926a6679172f8f3382b
-
Filesize
6KB
MD563a5cff79efad95434567d99e302e312
SHA197c137bdaa85ac53f3f1dac8c5c7073924ba9dbb
SHA256f45b8d1e0d938086f8b9e41e949f28e267cd2113388387d84f320d848a8a69dd
SHA512be5a6f3a78336668d8991b23a1f0fb79bd4d0a27387736b4bd0ebf02eba58ef469e01eaed2d7ee57e6f3259cb5c08493fe0ec0839f6cce085af8fd6d39d40c59
-
Filesize
6KB
MD5606f81e59999417f2c787a842826b1cb
SHA13bed0bce282e455ea973bb2082e3231964f292c6
SHA25676c7e0e134d5fdd012a275a0a14e35f727182b1240dfd8e3d55f2e22e4edad43
SHA512e65a61b33fef5270e32f6c2aa6d36997def360b8a5e2bf19c7cd88d540a427f702e2ea21f712407d5ca9b90acea97e4f4d5318f9dfabed1b357069782e04f7de
-
Filesize
6KB
MD5ada0e790dbe639074c5ba61e05fb5cb4
SHA123f2960483e04fd44fdad02f7c0b5af5d5c8b920
SHA256013b7245b73bbb68467c027bd57077e7bc8cbce1a05d15ddc48cd3873b346f64
SHA512a85a27578a52c0119660aeeabbdd3b76b27d86c61c95665118540d3fdcf5b2fc9add960b31b79d9fedd329a210b54c87c5577002baeeb69f9381017749ccd60a
-
Filesize
871B
MD56f8ceb8633ac1b9ec552eb223f661b00
SHA13eab65d46f2afb824140342932e72469c2c84313
SHA2569cfd8ab9fc14665e5732337cd4899ec8e07192e53813d15e95eacefbd9f1e6f6
SHA5126793b240b2d34f97fc905b20796757bd8a1b738de11708a6b4588a987864eb7b760f72647a86b053f6626b2e2b3cd3c6f6530dc6b7f5dafc117830f4a7b8bbaa
-
Filesize
871B
MD574411a439aaf945974f26652b08cf045
SHA1cb357d083d75c6fe837e16b62510711f3647da44
SHA2569369848d36722d60fac4c9e6ded070fcdaed2d5b5b3109fb2b4745948d9090fd
SHA5125410dcfef27c639b29d7381e023541d13c141745bb6d573e5453ad4c6b155f2961f4dca937f767a0c4a5f91264ca2c21c231cb721f936d923f08691c32ba23f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a5c67da8105e901840b7ea9cfd17e38a
SHA108476d1a84de4f9b395801b08f5fdb3505ff6ad8
SHA256446082292dcdf7a4d31acc71c12dcb7da674348403da0ee6feb323f991f4468c
SHA512c49cfa7946ff5962fa696cb102f90ae17644dcbda26c8af19268d0982eebfa24294ca0754d2073e5cf122cb8d43ef158b97e68e2b020180adc9e64bdc58fd3b1