Overview
overview
7Static
static
3c640c84fb9...1e.exe
windows7-x64
3c640c84fb9...1e.exe
windows10-2004-x64
3$SYSDIR/Ka...er.scr
windows7-x64
1$SYSDIR/Ka...er.scr
windows10-2004-x64
1$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
1tbu03852/options.html
windows10-2004-x64
1tbu03852/s...g.html
windows7-x64
1tbu03852/s...g.html
windows10-2004-x64
1tbu03852/s...b.html
windows7-x64
1tbu03852/s...b.html
windows10-2004-x64
1tbu03852/tbhelper.dll
windows7-x64
1tbu03852/tbhelper.dll
windows10-2004-x64
1tbu03852/t...091.js
windows7-x64
1tbu03852/t...091.js
windows10-2004-x64
1tbu03852/u...ll.exe
windows7-x64
1tbu03852/u...ll.exe
windows10-2004-x64
1tbu03852/update.exe
windows7-x64
1tbu03852/update.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
c640c84fb91ad5edaa497f3982f5831e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c640c84fb91ad5edaa497f3982f5831e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$SYSDIR/Kanye_west_Screensaver.scr
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$SYSDIR/Kanye_west_Screensaver.scr
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
General
-
Target
tbu03852/static_img.html
-
Size
503B
-
MD5
2caff3519f5be538757c467d4fec4756
-
SHA1
7e77344f049d9ee4d216b6f412c01ba28596773c
-
SHA256
e94503ad0ea2a4f7002ba70f57e12da9daabb5037b6bedc7725d1fc43a487415
-
SHA512
029814dd117053d03acc6c0cb1af2802256149c6a3588cd41334deeffad6095dc16386887e2053f288b13a5ebd3599cbf9c55c194fde81f3df77045d2609a467
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 4336 msedge.exe 4336 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2368 4336 msedge.exe 89 PID 4336 wrote to memory of 2368 4336 msedge.exe 89 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3116 4336 msedge.exe 90 PID 4336 wrote to memory of 3736 4336 msedge.exe 91 PID 4336 wrote to memory of 3736 4336 msedge.exe 91 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92 PID 4336 wrote to memory of 4204 4336 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\tbu03852\static_img.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8650546f8,0x7ff865054708,0x7ff8650547182⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2476 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1292060938947801540,2695392961112964675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
6KB
MD55a668fd3b6471796d4600ccd52c01df9
SHA18938866436457aceae4ec59e77bad8baa897bf8e
SHA25601f41d86e586a4a87d0cae07ada39194618d3f23b1e5185c7f75ce0b8e47da9c
SHA512b45259e8c324b1a6e8278a259cd059874ce7b6759b8cdaa49f4ee4b13deeeede0612ffe30bca4f89d2fa6e180d43293ddb45f97621cda0bf9872d93d3eac9238
-
Filesize
6KB
MD5c58856b17c1f8b868c761091082fe5a4
SHA129af18515d3b8db6baf5026b966dfc14b5e277e2
SHA2562cfc2c36f8308707860ae1094c96833fded5834120b694f429baf1916938e182
SHA5123ec1224ba5503c05f87b8569174483e1254ab25cce7620e9bb03091efa325d0c9c8a08c870ba69f715c308efe69ddec75eb57665c940e09712f8a99a03c0b6d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b63d5ab8d9ae97297878ac4e9b355bb3
SHA1d4c36aea4102cb36fc26e9a078d6ff1b46233f65
SHA256065f68099582c5d007d0ec63b31860a55a36b761d7dcec1a38073ef144e1edc8
SHA512eeb72e22a28a71d87c82d4b0b6dc7fe569675c85c84b6209bf7890714300e727cd53b30b54378c6632137cd66f0a9e6526985b3be70ff9c9e74886bbb98453eb