Analysis
-
max time kernel
240s -
max time network
284s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/04/2024, 17:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/926530092946038845/1160226234127634492/Soundpad.exe?ex=6623d4e2&is=66115fe2&hm=22b8d422c244a66ed24078805b5a1b391732668f55b8851291b3af8226208200&
Resource
win11-20240221-en
General
-
Target
https://cdn.discordapp.com/attachments/926530092946038845/1160226234127634492/Soundpad.exe?ex=6623d4e2&is=66115fe2&hm=22b8d422c244a66ed24078805b5a1b391732668f55b8851291b3af8226208200&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4872 Soundpad.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 573110.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Soundpad.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 2320 msedge.exe 2320 msedge.exe 2564 msedge.exe 2564 msedge.exe 2072 identity_helper.exe 2072 identity_helper.exe 4968 msedge.exe 4968 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 5008 2320 msedge.exe 78 PID 2320 wrote to memory of 5008 2320 msedge.exe 78 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4084 2320 msedge.exe 79 PID 2320 wrote to memory of 4912 2320 msedge.exe 80 PID 2320 wrote to memory of 4912 2320 msedge.exe 80 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81 PID 2320 wrote to memory of 3320 2320 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/926530092946038845/1160226234127634492/Soundpad.exe?ex=6623d4e2&is=66115fe2&hm=22b8d422c244a66ed24078805b5a1b391732668f55b8851291b3af8226208200&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd60d13cb8,0x7ffd60d13cc8,0x7ffd60d13cd82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Users\Admin\Downloads\Soundpad.exe"C:\Users\Admin\Downloads\Soundpad.exe"2⤵
- Executes dropped EXE
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,3148276202913548115,3483013287720666342,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5640665704433968c37408447a3ac2b08
SHA13116f51059b0d6a99d487b3023463c3582560cd4
SHA256f129e99b807b85376211a2b841434649f677cb9fe963b36c3b881dec35e9a5c2
SHA512cbff5323bed988717a6c2a67cf96c3570c52af70dac4b17df310b9d5052e3fdbe49918a4a41f021ab21db29e1c7e3184174f0e77ad2a50076a7e175db34ea98f
-
Filesize
5KB
MD51e2a2193c6c6948ec29b66a06936a036
SHA17cff49d9cda3ea6a6c8425561cf2f7e5f7aa17e5
SHA256490bb1d8cd5227142d7a5601b7cb7c521c2dc98fda6e2b361386dbb9d50debe4
SHA512ec0b8604b050e082dc9696d671e26fa5685ee8d8738cdae1ba80b4a77a6afc25e17668c6b31dfe60a5990061d389c2f4a1271943fd431349e0fa83e07e3879c7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5382ac62aebf5822569f985e690bc3381
SHA1db32d56c7dc5c1379dee2be5bc6d5a72ec9dea65
SHA2563759bfb89c8270bcfe3e8462739360c6fa929e007cc22dbb503d61a3cfc7e85f
SHA512ef14b1bf41a1eb0c23a4cdfe61493712f00f018a4489acaed978fc4f480c8645e00e7c0c74361775ac79d95533dcc0c4dd7f17618f45daa595fde093f537bd50
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
10.9MB
MD50ae4f60d72e0d1c159505500b8a08ebb
SHA1bb352dafd3c3ebebb4414b799010fe5ebddbef44
SHA256ed3371229647ef876b45cb5940e48b461df58d4e68ad4932f5877eba90c8d379
SHA51288495911df544a04a4e09828ae10b57d3d945c41d6e28964c2d4d077afa43fec1c82a8ff6dcce57a3c7b9e5d02d1e47f800f557b022866f5f7be4a2db9b07536