Resubmissions

12-04-2024 07:51

240412-jpx5bsgh56 10

12-04-2024 07:47

240412-jmzkdaca2s 10

Analysis

  • max time kernel
    203s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2024 07:51

General

  • Target

    https://qptr.ru/OqVS

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 43 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qptr.ru/OqVS
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff245e46f8,0x7fff245e4708,0x7fff245e4718
      2⤵
        PID:3524
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:3088
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2484
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
          2⤵
            PID:3216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:2688
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:532
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:1
                2⤵
                  PID:4632
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:8
                  2⤵
                    PID:4076
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:1
                    2⤵
                      PID:2636
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2352 /prefetch:1
                      2⤵
                        PID:4576
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:1
                        2⤵
                          PID:4612
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15848819431943779630,9826706334120558978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1
                          2⤵
                            PID:4216
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1928
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:884
                            • C:\Windows\system32\mspaint.exe
                              "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ConvertPublish.png" /ForceBootstrapPaint3D
                              1⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              PID:4540
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                              1⤵
                              • Drops file in System32 directory
                              PID:4948
                            • C:\Windows\system32\OpenWith.exe
                              C:\Windows\system32\OpenWith.exe -Embedding
                              1⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:2336
                            • C:\Windows\system32\mspaint.exe
                              "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\FormatClear.png" /ForceBootstrapPaint3D
                              1⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              PID:676
                            • C:\Windows\system32\OpenWith.exe
                              C:\Windows\system32\OpenWith.exe -Embedding
                              1⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:3084
                            • C:\Windows\system32\control.exe
                              "C:\Windows\system32\control.exe" SYSTEM
                              1⤵
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2816
                            • C:\Windows\SysWOW64\DllHost.exe
                              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                              1⤵
                                PID:368
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                1⤵
                                • Checks processor information in registry
                                • Modifies Internet Explorer settings
                                • Modifies registry class
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:3400

                              Network

                              MITRE ATT&CK Matrix ATT&CK v13

                              Defense Evasion

                              Modify Registry

                              1
                              T1112

                              Discovery

                              Query Registry

                              2
                              T1012

                              System Information Discovery

                              2
                              T1082

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                Filesize

                                152B

                                MD5

                                cbec32729772aa6c576e97df4fef48f5

                                SHA1

                                6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                SHA256

                                d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                SHA512

                                425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                Filesize

                                152B

                                MD5

                                279e783b0129b64a8529800a88fbf1ee

                                SHA1

                                204c62ec8cef8467e5729cad52adae293178744f

                                SHA256

                                3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                SHA512

                                32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index
                                Filesize

                                504B

                                MD5

                                051f053b82346c2e1e3daebfe32a3205

                                SHA1

                                ffbfb73987479138ea99ba94846d39a602f09c28

                                SHA256

                                6af38682cfa7e1913fda5f4a4ae57205bf298f973dbd387b4f18dbf9e901cfed

                                SHA512

                                39c7f2649522413ec047c1e273f618668e96d90832bfa89a13af7a3cb588c5be042b9e2b30f352e612aef6d3e8553c94ac3f601a0f0c9d7387ea4ce2255f11cb

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
                                Filesize

                                456B

                                MD5

                                5b85a776969b5008976ba45b5b1555fb

                                SHA1

                                63ff0a1a964fb05ff829f6230dd0d6bfd7f33fd9

                                SHA256

                                350feb8254d7c18cb42b5b8bb4f1576d4a143eeba6d458ba01f030a704923766

                                SHA512

                                924e1dee61a20f9aab3dd79a49e1793e5f399ea19f52912459cf3553171585de969934a009d85b30b5b449691e47730d797876cdbb0736f0710ab8a90935aa3f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                Filesize

                                910B

                                MD5

                                a2310176359b907e4ee8296a5a602f46

                                SHA1

                                93c8b9a5899fac3b14b90bffd6ba9b0be613d0a7

                                SHA256

                                922d27ebec0b8c93836603aac37491ebc060b346303ee644f518c88c125e36e5

                                SHA512

                                b63f2799a2c4230c119466b11448a625fd899434575bd8717e78e15d3d180b3b157b3101506d21ca930b1dd6d8d136f86701d75153e13559fb4e03d57cebf205

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                Filesize

                                6KB

                                MD5

                                ca6cc56e312235572919f60ef17a8034

                                SHA1

                                3df015adf967a7172723f4872f2c4d22b9c8971a

                                SHA256

                                ba8e6a559f929af89dd2cd1213b0b593e04ffd69e9d08ac6f9862785de4366ef

                                SHA512

                                63acc9269a57bf5e763e86790e2349e6f3a11b2200a769fcbeab8ae53c67254c152f18e88ce4a66f912434e9499bac1731d9ba7a1a333432b3a4358fc28bd944

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                Filesize

                                6KB

                                MD5

                                29175dae16130801044c6956c8664554

                                SHA1

                                b6480e9609423447aeb43caa56c166fd9a4f3354

                                SHA256

                                8d5823951e7b8c97fa55006aae2919492ccdf3844ef25d6b714a2df83b35cf01

                                SHA512

                                dc32dbbd6d1a780b997a20db83e3713b3b070b1dd75544eef42621660ebda8007e5859ec1ce30f536261f9e5a347451b731de32765978a082eeb58cf371f40a5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                Filesize

                                6KB

                                MD5

                                e2d1ffece342350581fce0b6723daa73

                                SHA1

                                171f533d041336827a4849b584b5cb0d4982e8cb

                                SHA256

                                fd41f3160b934c60b55c7b71024f2e51d7e18c3b53f396c785bd9b5838fbb31a

                                SHA512

                                c2f694357a0141f6e4efe2c1a8ebcc540caa9d7d742cd8c0254c97ca197c2411ac84b469ad0837c8325c0026a41cd899268ae6284546ef1f520591e9bbda5a4b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                Filesize

                                6KB

                                MD5

                                86b6f6c63587bca35ee8a8e11002dab2

                                SHA1

                                25d98aef31dcd18fddab025f7cd9992365aa0513

                                SHA256

                                3da7c5984cbe1b95e372ff6082315414bd811d29f4d7e91ed2bc20c7530273a1

                                SHA512

                                3ab991b13abc512448cd2cd6451592374cc19221b3cd13f919f3e0aa289298c6b79e8e94cef09edbb432ee459b7bc4c8000064333a4746051a57719051da12fc

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                Filesize

                                12KB

                                MD5

                                3a26271768ea0ccf5d365eeefc8e5c82

                                SHA1

                                d25b4930fb5bff9468173347fb5855510446b5e2

                                SHA256

                                f2375184d04841472edb0edfb6b798a2b87a81a606fe311b4bebf46ef6308151

                                SHA512

                                ce014a8a6d1a66865b5169d8076958288161ad2a4feef34c0ee3bcfaba23023d27170b599a59d34f008d729880f899abca9e1407279feb918114c9517c85e5d5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                Filesize

                                11KB

                                MD5

                                5755e9f0b9ed3bd69907b7fafbed1669

                                SHA1

                                582c485b3f9cbb268e46c6468b6718c7a15e2b77

                                SHA256

                                f810b3bdba38efafd9b909fb75cdba8466244f9952c22fac4d190605a1ddc821

                                SHA512

                                f6c902f5e304c959f2acd55e1fdf563bdf3bbb1900480c59110f63fbb6a1c72dc397ec54ac712b8e0807c2b4e4cf7c39599d8b0c4fc4a5bd94829ea04b695df4

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic
                                Filesize

                                2B

                                MD5

                                f3b25701fe362ec84616a93a45ce9998

                                SHA1

                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                SHA256

                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                SHA512

                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                              • \??\pipe\LOCAL\crashpad_4696_FCLOOBTWGTOQNPYN
                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/4948-371-0x00000248E7FC0000-0x00000248E7FD0000-memory.dmp
                                Filesize

                                64KB

                              • memory/4948-375-0x00000248E8960000-0x00000248E8970000-memory.dmp
                                Filesize

                                64KB

                              • memory/4948-382-0x00000248F0C50000-0x00000248F0C51000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-384-0x00000248F0CD0000-0x00000248F0CD1000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-386-0x00000248F0CD0000-0x00000248F0CD1000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-387-0x00000248F0D60000-0x00000248F0D61000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-388-0x00000248F0D60000-0x00000248F0D61000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-389-0x00000248F0D70000-0x00000248F0D71000-memory.dmp
                                Filesize

                                4KB

                              • memory/4948-390-0x00000248F0D70000-0x00000248F0D71000-memory.dmp
                                Filesize

                                4KB