Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-04-2024 01:08

General

  • Target

    f6497016f483d2d995085b6ca24d1bcbdb02007018cf05ff2da06e022c0f7af5.exe

  • Size

    37.4MB

  • MD5

    180bee110e8b93ded9a327a21df785ec

  • SHA1

    37cb43f1e933cccf5383d9b21144122f35109d9e

  • SHA256

    f6497016f483d2d995085b6ca24d1bcbdb02007018cf05ff2da06e022c0f7af5

  • SHA512

    c26177b766053f54e61df0d7d113fc4ff176340824ff9d4a5233d3da19a38a207ab71a8495950f9fcdfda9ea5ddaad08c067ac49876f9571137a1ef5b8cc9b10

  • SSDEEP

    393216:LERqMInoJITfRwF6OYPlCPPIQAerCTat4jNQjJ47yiVpTcDxvVRRWdtMPD9e:LE9iTfRwFQuMXj2IyiVVcDxvVLyaPZe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6497016f483d2d995085b6ca24d1bcbdb02007018cf05ff2da06e022c0f7af5.exe
    "C:\Users\Admin\AppData\Local\Temp\f6497016f483d2d995085b6ca24d1bcbdb02007018cf05ff2da06e022c0f7af5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x86&rid=win10-x86&apphost_version=7.0.10&gui=true
      2⤵
      • Enumerates system info in registry
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc967b46f8,0x7ffc967b4708,0x7ffc967b4718
        3⤵
          PID:4928
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
          3⤵
            PID:216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4084
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
            3⤵
              PID:2280
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              3⤵
                PID:3472
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                3⤵
                  PID:4552
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                  3⤵
                    PID:3256
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5380 /prefetch:8
                    3⤵
                      PID:3780
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:1
                      3⤵
                        PID:4444
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6004 /prefetch:8
                        3⤵
                          PID:4496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:1
                          3⤵
                            PID:4520
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:8
                            3⤵
                              PID:1408
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2620
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:1
                              3⤵
                                PID:1364
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                                3⤵
                                  PID:3848
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:1
                                  3⤵
                                    PID:1408
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                                    3⤵
                                      PID:2508
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,10402103344687314991,11512139462242207497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:2
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4592
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4772
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4964

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4d6e17218d9a99976d1a14c6f6944c96

                                      SHA1

                                      9e54a19d6c61d99ac8759c5f07b2f0d5faab447f

                                      SHA256

                                      32e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93

                                      SHA512

                                      3fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      456B

                                      MD5

                                      cc938681bbcadfc9bc26b50379a1ada3

                                      SHA1

                                      05f28f4d109a1ac301c41cff8f4481a10b31b7d1

                                      SHA256

                                      3ddb17b38f3e965d5ffdb66908f878fd3637de61feaa75161fae97882c25cdf2

                                      SHA512

                                      c822afa1ab3c98370fd65c8aac0d2a82b50a385cbdc25afeb34559d7ffbcd946acb13578deb246fa33cdd9c0a372ed921459200df9f071b2e6556ba641df18c5

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      980B

                                      MD5

                                      a89bf53b4d6c0bd2aa669704bd68b693

                                      SHA1

                                      4ce486472851ee08627e0a06a38a815bacfa0943

                                      SHA256

                                      c4872e3dd355478e8ca2e61a1b003321e423c835a9b9d4428c1b87c4d61f467e

                                      SHA512

                                      0a67e48743b3fe72b5f4c2810fb2e060780f84b58804fcd5649e2687d4891c305c27e449a53dc813be3ce706bde24d75e6f1666685e11f87133283a80b7fd94e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      01854f026a25eaed533e7d20df7a1e1b

                                      SHA1

                                      17a684729415a3fe161f09853e28f7dfc40fa86d

                                      SHA256

                                      36864ca4506bbf7c8949f8ca94e792ed988a73e29a2c9fc3c4818ef3015c9362

                                      SHA512

                                      11fb6a16250277ac6a553768b531c53a6db31b831cac0d878c9f65dca1deae88ef3237c73bc5d57d52c9fea25074242348ecd1ce016c6a1b83cd25421eb10d98

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      fc5feab4d370fb1a829f7a98e5f35902

                                      SHA1

                                      a4e997277f716480b792fe28e84d2b42d5929252

                                      SHA256

                                      9c6a0d0fbe32eb9fadfba3dcef0c430f5f1ffc2a86f047af7836a943df52577c

                                      SHA512

                                      6a3335cfc17926a41a9caf2f9f0babb9aa3a9348f604ab2721242aa009ee61e84bfaf4f866eeafa22f6826af5fe05a2008af4a5d09983db5758d7407b237ec19

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      6c2b936c9fbc563a6e4aed08b299589c

                                      SHA1

                                      865884396a648512d686af0cf8a447bfaab03f4c

                                      SHA256

                                      a7e89021266c42cf61e4a2aaf6d0fb0b0eba67e5aaaf1678854ab363d7a969d5

                                      SHA512

                                      523034ecae7d7216f47d6cf76ecb9418f3e81d3b4e58af6211841c8cb00ebc6e3f6f979927937562246f5cb16bbec1f2673389f27c4f42193b90adaa78f59554

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                      Filesize

                                      24KB

                                      MD5

                                      c2ef1d773c3f6f230cedf469f7e34059

                                      SHA1

                                      e410764405adcfead3338c8d0b29371fd1a3f292

                                      SHA256

                                      185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521

                                      SHA512

                                      2ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      874B

                                      MD5

                                      1af930ae2a4291a2fcd5c1714501a53f

                                      SHA1

                                      64bda9b54f0ebb2f934e9185accf44b03f5798e9

                                      SHA256

                                      2149a4cd490d81184008f5414017354b7d5e02519018286c485158a667be6335

                                      SHA512

                                      13745fc614bbf3fbc005321d65c832abc67a7df2d9e0fd6775031bb994d52165fb8afc47e93f9ffc3f7713cc99a6d24bdffd9898a8b5609732a609eddf70f953

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      874B

                                      MD5

                                      60e9bf04c68a8bd33c66c4235bea2e09

                                      SHA1

                                      b4bb6935539fd900773e008fdc175d4f6e7f5f27

                                      SHA256

                                      d15bbb5f59c5285ef6b9da5c66bdbb993780a5662314234474e51a89c7c7f0b2

                                      SHA512

                                      6d51565634a83c563df8510d3e3518e7a8a3d8385cca9d774a183d4d616c9e7d2c58e186e9c06343a25162588eb3454378d815d8e8bc7bf4ce7f1964d87d942c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe587952.TMP

                                      Filesize

                                      706B

                                      MD5

                                      c820f8438a3c4a0c00204c76864f0651

                                      SHA1

                                      71bcadef60b98fc79e06b35d58c4627c0f12e3bd

                                      SHA256

                                      099fbc779ad5c7cbd47f3a91bcce9c8bb34d316d5a35170650222947f0ecf833

                                      SHA512

                                      d6009d6d6ddaa58037cb417d4fe47c23675599ad16d6362ca1bbfd98a7d48ed855285aa4c0bfba939fe3c84dd5c39c9e4aef4e6ef05e44c20a35072ac608aff6

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      6c45874261686aec07d3327386d3f18c

                                      SHA1

                                      ba2b0e56f0ab1a6fc9a93700ae4a65537bd80f15

                                      SHA256

                                      a6f5f65cca11246f62497075194bb941f09d7cdc6c60d01b984a6d70afa59428

                                      SHA512

                                      f9bfc2fc1de84d48bdae315a4f3c6976ca1d7ea94aa9d51b10e77e304c9b1d4727d770a9606a25958fb8b674bdb453db0d5694f6fdc2d1464822ced59af029a4