Analysis
-
max time kernel
148s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
removeedge.bat
Resource
win10v2004-20240412-en
General
-
Target
removeedge.bat
-
Size
2KB
-
MD5
5f51dfbc9b44b2d5f0d55699686a891b
-
SHA1
acfd75219ff08f9e96c45d2022ae4d9a59e89d77
-
SHA256
a910f47d7c5ce1f4dc1b09dbb3bcdd878d97acc2f3755e25ffa6ae64cc8771d7
-
SHA512
1b2d1f7879b02c1aa23795f9bbee1b2b60f3730e016ada76c39d3d5df6423d584040bf8adb408928a4e801ceb540dbc6e308d6e0f50e69e829eed45dec44d557
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} regedit.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 2536 takeown.exe 2128 icacls.exe 2456 takeown.exe 3584 icacls.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 2536 takeown.exe 2128 icacls.exe 2456 takeown.exe 3584 icacls.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2408 taskkill.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 4292 regedit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetakeown.exedescription pid process Token: SeDebugPrivilege 2408 taskkill.exe Token: SeTakeOwnershipPrivilege 2536 takeown.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
cmd.exedescription pid process target process PID 3532 wrote to memory of 2408 3532 cmd.exe taskkill.exe PID 3532 wrote to memory of 2408 3532 cmd.exe taskkill.exe PID 3532 wrote to memory of 3580 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3580 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3720 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3720 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2536 3532 cmd.exe takeown.exe PID 3532 wrote to memory of 2536 3532 cmd.exe takeown.exe PID 3532 wrote to memory of 2128 3532 cmd.exe icacls.exe PID 3532 wrote to memory of 2128 3532 cmd.exe icacls.exe PID 3532 wrote to memory of 3084 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3084 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3600 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3600 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2456 3532 cmd.exe takeown.exe PID 3532 wrote to memory of 2456 3532 cmd.exe takeown.exe PID 3532 wrote to memory of 3584 3532 cmd.exe icacls.exe PID 3532 wrote to memory of 3584 3532 cmd.exe icacls.exe PID 3532 wrote to memory of 540 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 540 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3212 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3212 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2884 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2884 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2740 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2740 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2924 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2924 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2320 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2320 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 5100 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 5100 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2572 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2572 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 4292 3532 cmd.exe regedit.exe PID 3532 wrote to memory of 4292 3532 cmd.exe regedit.exe PID 3532 wrote to memory of 2024 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 2024 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 1964 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 1964 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 736 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 736 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 4196 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 4196 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3528 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 3528 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 4832 3532 cmd.exe cmd.exe PID 3532 wrote to memory of 4832 3532 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\removeedge.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing dir C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe"2⤵
-
C:\Windows\system32\takeown.exetakeown /a /r /d Y /f C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe /grant administrators:f /t2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing dir "C:\Program Files (x86)\Microsoft\Edge""2⤵
-
C:\Windows\system32\takeown.exetakeown /a /r /d Y /f "C:\Program Files (x86)\Microsoft\Edge"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Microsoft\Edge" /grant administrators:f /t2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing dir "C:\Program Files (x86)\Microsoft\EdgeUpdate""2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing dir "C:\Program Files (x86)\Microsoft\EdgeCore""2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing dir "C:\Program Files (x86)\Microsoft\EdgeWebView""2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Editting registry"2⤵
-
C:\Windows\regedit.exeregedit /s RemoveEdge.reg2⤵
- Modifies Installed Components in the registry
- Runs .reg file with regedit
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing shortcut "C:\Users\Public\Desktop\Microsoft Edge.lnk""2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing shortcut "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Edge.lnk""2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p=Removing shortcut "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk""2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\RemoveEdge.regFilesize
263B
MD54c8a079090c727bc831413155239b6a2
SHA12d595495c067b1784a427d73bc6658167e13a2bb
SHA2567cc8c0543a77f3bb508cfc21e86cd957300de4e48c2e1366dc9f1b37ce76a108
SHA512a33df0d82cfe0d770633a43df3acec53d90bd2bbd222182cd1601bbfe62c8a862ca7a30d2e422d325a3fd0fd68d8a4e8090de9b90fa61c791e6756ff655321f4