Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
libcdg_plugin.dll.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
libcdg_plugin.dll.html
Resource
win10v2004-20240412-en
General
-
Target
libcdg_plugin.dll.html
-
Size
7KB
-
MD5
91e8cce570905b99ef66ca15396a66b4
-
SHA1
ba63eed6b84104317015d0b3c1551cb0e1ae6eef
-
SHA256
3e99fdd3483a3096be3c25a5827f356afc5f66579c77ba9dfe5e11604e63e9cf
-
SHA512
20fff1fbc48f07e77ab48f74083e9e98b54c247b60575371249b0f605f668b40ff450b59a3e763e936ca60e50a632e6704c8b4a86b6b7db5ae4613dedeb64f1a
-
SSDEEP
192:Z/vTPMcMHyCvhvcvixvhvCyvMX4vev5B/lo3nvXvuvnzv+vYCvuvdUQE8uI:ZDPMcMHyAKXx/PE8uI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1032 msedge.exe 1032 msedge.exe 2708 identity_helper.exe 2708 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2752 1032 msedge.exe 86 PID 1032 wrote to memory of 2752 1032 msedge.exe 86 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 4000 1032 msedge.exe 87 PID 1032 wrote to memory of 1788 1032 msedge.exe 88 PID 1032 wrote to memory of 1788 1032 msedge.exe 88 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89 PID 1032 wrote to memory of 976 1032 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\libcdg_plugin.dll.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6842694989764228346,3870897171675356180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
6KB
MD518c8fbf2d33a3610a1c519b158726ef1
SHA1fb4be1dd724f61cd1cfebb89132596230d544157
SHA25601ebf45d20b93ab270ea9d474249512b7a57792c49ad0b9c0d89fbe4142e7c0d
SHA5123edbb68f5aab4b48cbc756d936f196a100d12388f979abe6aef950d1e9e3798fb5a2ab69ac3692939487feacdf53b75d5a9d50d137b7e1a2ded6d5ce0cead2c9
-
Filesize
6KB
MD5d08c7a2016a6b18b07aacc3b8cc15f59
SHA1ec7462f70e9752f64dabf43b10df53ba1c3804fb
SHA2564afab2fc60c23b3cc0062d7f6a27802a48dfd593e9d8653f064aeea3ca22074a
SHA512ab1d0564bc2a046d6bcbbd83a15640aff702f21d579a7277668ccb140e56a5ab1323c76235450f11d9562031cd3712343e2b9bc8cf0d342d3f1148640c477d6a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d75cdb1fa3a0cce00ba15fb65d18ab61
SHA14334af7310b5321f4418f47b7cdb834b29570a3a
SHA2563fe6e8c723cc4ea86e0a7ecdea99ad90622149e84967fd5ae6b55947f16aabd5
SHA5124fa8d313a36f17478fb9626eacb146fcb2ee0b7efdc07cd659df0725f230780dee61fde91ab828483a6ef8e8c91fb29fb0afba6dd008b3816bd25c7095e99b5c