Analysis
-
max time kernel
270s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
CabFD.cab
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CabFD.cab
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
authroot.stl
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
authroot.stl
Resource
win10v2004-20240226-en
General
-
Target
authroot.stl
-
Size
171KB
-
MD5
9c0c641c06238516f27941aa1166d427
-
SHA1
64cd549fb8cf014fcd9312aa7a5b023847b6c977
-
SHA256
4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
-
SHA512
936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
SSDEEP
1536:+AuJ+lCUs0RvWqgCyPW5BXNWdm1wpyru2/3EwjYoz0VDTrubmt6mJp:+9J+q0RuXCyfdmAyru2/RAKtgp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1128 3344 msedge.exe 124 PID 3344 wrote to memory of 1128 3344 msedge.exe 124 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 488 3344 msedge.exe 125 PID 3344 wrote to memory of 4012 3344 msedge.exe 126 PID 3344 wrote to memory of 4012 3344 msedge.exe 126 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127 PID 3344 wrote to memory of 5024 3344 msedge.exe 127
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\authroot.stl1⤵
- Modifies registry class
PID:1628
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault672458a5h97f5h4253h823ch78b59ea9c7d31⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb007846f8,0x7ffb00784708,0x7ffb007847182⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,88480648775195836,6881316073080407383,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,88480648775195836,6881316073080407383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,88480648775195836,6881316073080407383,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5228
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper1⤵PID:5316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
5KB
MD51e2b5cd02a166cf647b71114904c1360
SHA1615e1598da027479a35c83eefc27854c8cb9434d
SHA2561acd0b01603f6a8e3496f82b186bd9f513ff9fd40ef065a984ec0e8114c47402
SHA51204f4fb8ce4fd91caba4ccf65ecdcf9a41154139461208e26c03b2ff7d39228b4ecade87d73d819eebf8451f4731419439c5a0766b01b77985fe7ac4362020234
-
Filesize
8KB
MD5985bf36f9e9466ce979f1234ed59b016
SHA105dbe56230e1a6d3a8f78c44ff87f01ff0222b16
SHA2567ed293181be107fb9d07a728cfad25b6ad65b0f9c1035dad5cef5f2dab62e0c6
SHA512497baf2f4984e7415d487eaedc4399d837709f8d89bf0ba19e26dcee1d8b1051e5f5f37b7572b265ac9e2a1e2a842d60150c8b602eb2a890c1e4bd9d3b1ffd79