Analysis

  • max time kernel
    63s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 14:39

General

  • Target

    https://cdn.discordapp.com/attachments/1226896634793951283/1227229032039583814/BlendV0.0.2.zip?ex=6627a51a&is=6615301a&hm=0142b747e0c3e352c2178fe2240c0d5fb417cdc60cbb668af4afab9fe0e406a2&

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1226896634793951283/1227229032039583814/BlendV0.0.2.zip?ex=6627a51a&is=6615301a&hm=0142b747e0c3e352c2178fe2240c0d5fb417cdc60cbb668af4afab9fe0e406a2&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc96ae46f8,0x7ffc96ae4708,0x7ffc96ae4718
      2⤵
        PID:5000
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
        2⤵
          PID:220
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:8
          2⤵
            PID:4968
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
            2⤵
              PID:1532
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:2108
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:8
                2⤵
                  PID:1432
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3592
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                  2⤵
                    PID:1456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                    2⤵
                      PID:616
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:1
                      2⤵
                        PID:2512
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                        2⤵
                          PID:1292
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5372 /prefetch:8
                          2⤵
                            PID:3248
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                            2⤵
                              PID:5016
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,9579233028655967784,1743602379182783604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1104
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2568
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4436
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3156
                                • C:\Users\Admin\Desktop\BlendLauncher.exe
                                  "C:\Users\Admin\Desktop\BlendLauncher.exe"
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3096
                                • C:\Users\Admin\Desktop\BlendLauncher.exe
                                  "C:\Users\Admin\Desktop\BlendLauncher.exe"
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:824
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4936
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\BlendLauncher.exe.config
                                    2⤵
                                    • Opens file in notepad (likely ransom note)
                                    PID:3828

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BlendLauncher.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  fc8bbe1be1c0db6f8ea9ae29ef4bceee

                                  SHA1

                                  5120e6ce269b2fbd9f9f6b56503202c9554cf57b

                                  SHA256

                                  2ab3ff0054e492b3126230787198a53d9f25a6b0dd00571d39f9963321410871

                                  SHA512

                                  dbc1ad368bd07e25a8e749e7d438aeb734ae0a156d7fa01439fabc633df6aff7f791ba6f0247490ba08178822037531d9c230207a9c0436ea34a4d0c5579ae53

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\91c66634-a62a-42ab-a2b5-f388a25a66b2.tmp

                                  Filesize

                                  10KB

                                  MD5

                                  a23639ef9f3a4d54ccba513e8f02d7e0

                                  SHA1

                                  720325e0d7bcb1c9e0933346289bf033eb7c2ab6

                                  SHA256

                                  69c14ed16b512d71f592a1ed3fd6e07790887b780411077b347e0ec555015144

                                  SHA512

                                  62eb30119604fc3376d18b98e3e4cb1f0ac5c1aba714b1a24dd48956c1bf82e2b784847de769b89e1e986164cdd9e6ee97c9db9283523d20043fe97df4b9c2a1

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  4d6e17218d9a99976d1a14c6f6944c96

                                  SHA1

                                  9e54a19d6c61d99ac8759c5f07b2f0d5faab447f

                                  SHA256

                                  32e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93

                                  SHA512

                                  3fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  186B

                                  MD5

                                  859cf9cd77c9a6bd5b0af56f08fb5128

                                  SHA1

                                  d62387a78e8a1643ba3117187479da14bce1b65c

                                  SHA256

                                  d16c0bd72e9deb73d2e3a40eb21ac668477363c33e58765884b1663324a4eb05

                                  SHA512

                                  e60f5d7000507794a20316c7110fbee3f1d9b02efdba877bec150d5d63939eff3aa9fbba758709a8094c65a083b158840563a8e8399b64e16a077d12a1cb8fed

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  274d1b0a9a0dd6dc634a5e9d69be5aae

                                  SHA1

                                  1be0f94bec2588acad68ead029dcfc5d658dddaf

                                  SHA256

                                  1d683bb4f55d7427450ade91c3c35b578a25d37b94e51ed8fc5f7d70ec332e08

                                  SHA512

                                  77cdbc363d29da1cfef615196a10780c081b13baa347d593160e9522b94e1133315e1a330cf08f50defddd73985093b19d3636db876e51bbd27dda99fdd9556d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  3e41a97533faf167e786b00faf3445a9

                                  SHA1

                                  71b58dbb97029a5dbe9e4f18df3ddd1befd86c5a

                                  SHA256

                                  16f7d8e46619dd09d88494ad886fea2f9bd8a17f4007dadfd133d8292575ca76

                                  SHA512

                                  c36522f32dcd47faec63b525e7c30795076ab6bfaf68f5e57378413fa97169dc0842e9690eee50abfdc5a91100f28f78da9a3429056a4cb4b9c22748aade37c3

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                  Filesize

                                  24KB

                                  MD5

                                  1c7ec27d94da04714401b9adf0b17756

                                  SHA1

                                  3e18d51664cd7c8036552c1557391ae0e7d3363d

                                  SHA256

                                  57be391e5772faf9845cc18c3b6c5e428c1181feaa56c5dd4c4d16472c9ebb52

                                  SHA512

                                  067ce3414a4fdadf8b1fbc79cd0abfdbde43e60b848d9f06e1310f3c1192ab2135347d570baa9c1eee1da941f70e66a85ff4a82fcd6286268c542c97a5f2ba24

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  f2a103cdf82d0eff1e49b8711f3cfa97

                                  SHA1

                                  8e5d447a29ebc16ba077fb499f40ac4b40009bea

                                  SHA256

                                  9b526aa3dc88991d09e898eb05452ea8338064cf3b0d8814a336ae2b945e3b9f

                                  SHA512

                                  fd2e02beccfdf9f163291898cee5c136272980b5237ec75a7bcf62a4469425e08b6bdc1bede23f7b9e9a6000dd91133201a14490d9cb0e0d4632d7b684c9eaf5

                                • C:\Users\Admin\AppData\Roaming\Blend\Settings.ini

                                  Filesize

                                  43B

                                  MD5

                                  82110ea498a969f1ed47ab6fa4ac32a1

                                  SHA1

                                  e6c8556e18f9a5af8ee99b38b376d7811494df9f

                                  SHA256

                                  5485be7a97565907ab334c5bdb3c29461ac8be87568b95b62c4382070fa1ec71

                                  SHA512

                                  2766b0671b3c44e99123b6a87d8cc3142dea567e517ab2ab742d2b03e1b7ba33815a217793c11bced6e59ea634827ba1db2e081eb8e19cc053040cd592d0ccbc

                                • C:\Users\Admin\Downloads\BlendV0.0.2.zip

                                  Filesize

                                  5.4MB

                                  MD5

                                  7f5c363b42f487fa2155f6ed9b521213

                                  SHA1

                                  a0b45dc797bab3c0a1b990397b5b42e576792230

                                  SHA256

                                  b55ec66bee8d57ab82221c81a4e7e3b714523b1d6dbfb5a8ca3ad49364bee821

                                  SHA512

                                  d737be739d1f5c4f77255ee5881a0018e8c6d38c79127b3b819068c67511b3cd63b9297f4576778b8ac678cf2008c4a56340c32fe0d09cd5a402c680aeb83245

                                • memory/824-192-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/824-190-0x00000188CC4F0000-0x00000188CC500000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/824-189-0x00000188CC4F0000-0x00000188CC500000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/824-188-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3096-171-0x00000147ECB90000-0x00000147ECB9A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3096-180-0x00000147ECC50000-0x00000147ECC60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3096-173-0x00000147ECC50000-0x00000147ECC60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3096-174-0x00000147ECC50000-0x00000147ECC60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3096-175-0x00000147ED0B0000-0x00000147ED0BE000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3096-176-0x00000147EF4E0000-0x00000147EF518000-memory.dmp

                                  Filesize

                                  224KB

                                • memory/3096-177-0x00000147EF450000-0x00000147EF45E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3096-178-0x00000147F1860000-0x00000147F191A000-memory.dmp

                                  Filesize

                                  744KB

                                • memory/3096-179-0x00000147F17B0000-0x00000147F17B8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3096-170-0x00000147ECBA0000-0x00000147ECBA8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3096-184-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3096-186-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3096-172-0x00000147ECC30000-0x00000147ECC4A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3096-169-0x00000147ECC00000-0x00000147ECC26000-memory.dmp

                                  Filesize

                                  152KB

                                • memory/3096-168-0x00000147ECC60000-0x00000147ECD48000-memory.dmp

                                  Filesize

                                  928KB

                                • memory/3096-167-0x00000147ECC50000-0x00000147ECC60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3096-166-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3096-165-0x00000147EA0C0000-0x00000147EA652000-memory.dmp

                                  Filesize

                                  5.6MB