Resubmissions
09/03/2024, 17:26
240309-vz93esdd27 109/03/2024, 17:24
240309-vy7kxadh5v 809/03/2024, 17:24
240309-vyv7wadh4x 1Analysis
-
max time kernel
85s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1137051887514964049/1137052151038885888/StickyCosmetics.dll?ex=65fdaad6&is=65eb35d6&hm=068d42af87d7506d46db186c8081deda244565e63b9be94daac4c3e5a918dc32&
Resource
win10v2004-20240226-en
General
-
Target
https://cdn.discordapp.com/attachments/1137051887514964049/1137052151038885888/StickyCosmetics.dll?ex=65fdaad6&is=65eb35d6&hm=068d42af87d7506d46db186c8081deda244565e63b9be94daac4c3e5a918dc32&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 854534.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5488 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 4404 msedge.exe 4404 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4964 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe 4964 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3312 4404 msedge.exe 88 PID 4404 wrote to memory of 3312 4404 msedge.exe 88 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 4076 4404 msedge.exe 89 PID 4404 wrote to memory of 3392 4404 msedge.exe 90 PID 4404 wrote to memory of 3392 4404 msedge.exe 90 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91 PID 4404 wrote to memory of 3320 4404 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1137051887514964049/1137052151038885888/StickyCosmetics.dll?ex=65fdaad6&is=65eb35d6&hm=068d42af87d7506d46db186c8081deda244565e63b9be94daac4c3e5a918dc32&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdde2a46f8,0x7ffdde2a4708,0x7ffdde2a47182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2136 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1752 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,13434077201564725851,5536756234517816173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\StickyCosmetics.dll2⤵
- Opens file in notepad (likely ransom note)
PID:5488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD57a0b5d8bdea7512193c3ec3b18d6a64c
SHA19b9637f3894b31a5ad8a5a313bbfb4937f1511ab
SHA25615b528e6da0df80e457f834ede246e58edc34c7a3e8300d5623e400f3cbb5378
SHA5122d7329452a84f39c9623d7767b3d5991e01149eff4b4a1150a58e613dfd2c20a4d171024e825e1d5fc91f15b964cc9c2d6b610b66777fb88901774991821c4dc
-
Filesize
6KB
MD585224f443c7f85b32ea011692988a5f3
SHA13cde291248e1b2fda3e799c103809c0c945b8bfa
SHA2560be35a96944d603bdbdd7facf2c716d41f6e977849fc73fa310cc62b87e04540
SHA51269874a863b7cee70bf7c58f21eddd3583cf7ebdb68e0ebb0dea14ca06d1a9d60ece805f5e5f67df4f510e6478ab2b653350f7e451e3ce0f38f021d7b41b44099
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5157bddf0463a6542d8ce3a9db65e0a31
SHA161f63afeeb6da34e7c2499abf9e297c8ea82dde5
SHA256484e3418cdddaf84ff17998b139f41b0ee6c22c88d1b886e576b723732f751d7
SHA512b6ef1f44609d928163bf2b4b008f7f7fa6026a71c8dcd34d64dd01fd03b49525aeb8a0eb5fb04d252a67ac185833eaad9a5dd0dd8c3b2fa4231cec0e6e73cb08
-
Filesize
11KB
MD55bcc438e8a766a962d3a6b4847da29b9
SHA19a5eb1d2ef83b2a70696b6dd55bf53643264b8cc
SHA25685d5237195e06cad9edb2a0b7170cf83714db336e34ccfe619e8bdb82b3203fc
SHA512cefd5d40070409cce2ff1b5ff00198a5b972823c23928ae140090b9a2f69d3a04107c968d9bff7a87f147a1f8a2a493d99786d5bd9f1ab0ad6ee91d1ac3098fa
-
Filesize
6KB
MD586d9b7aacfe3e0bc14d906bc78ae9e5f
SHA150ec6cd9fc407e3f736b5d60aaecaafee9db3819
SHA2564dc034cf2eb15db27a6060dcc2866cb80e28c5558b99f38e244da36e9b55b3bc
SHA512714cc44bfa06ed342ed9dc67a263750da1af4099f1adf65c47f3595c2a1e7e8b323616f1e3d26873599c7df5ebc63377d6ed4ff6020a81552cd09b76b5d2183c