Analysis

  • max time kernel
    39s
  • max time network
    49s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2024, 21:06

General

  • Target

    https://cdn.discordapp.com/attachments/1228814129419255868/1230624232015401042/loader_test.exe?ex=6633ff20&is=66218a20&hm=281b99f9bac14f27b575decbca5942fcb49f40c276853487363e94a9743ed0e7&

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    PID:3172
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1228814129419255868/1230624232015401042/loader_test.exe?ex=6633ff20&is=66218a20&hm=281b99f9bac14f27b575decbca5942fcb49f40c276853487363e94a9743ed0e7&
      2⤵
      • Enumerates system info in registry
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffec4b13cb8,0x7ffec4b13cc8,0x7ffec4b13cd8
        3⤵
          PID:4252
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
          3⤵
            PID:4884
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2944
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:8
            3⤵
              PID:5028
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
              3⤵
                PID:3876
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                3⤵
                  PID:472
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                  3⤵
                    PID:3564
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                    3⤵
                      PID:4476
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                      3⤵
                        PID:3668
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:1
                        3⤵
                          PID:1420
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                          3⤵
                            PID:2364
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:8
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4016
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5984 /prefetch:8
                            3⤵
                              PID:3080
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1588
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,424454853424397139,14351317402883725252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6156 /prefetch:8
                              3⤵
                              • NTFS ADS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3968
                            • C:\Users\Admin\Downloads\loader_test.exe
                              "C:\Users\Admin\Downloads\loader_test.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2488
                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4964
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2488
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:724

                            Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    7554e30cbebbfe1aba35488a485a9166

                                    SHA1

                                    1312cb8e5027ef37ca2e3e9a8689e3bc23f44f80

                                    SHA256

                                    0180b897f28fb36a3f005962f6e83fc855fe91a65dfd291124d4d8f8badd1d6f

                                    SHA512

                                    350bde3084974b5b17c7b5b05dd1365687cec55ef21e73f1c12754a93a6a4addaee4dd93ab849a2374325c1a60c73eac9ab5adb90d72c03195f5946a03a47540

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    b7fc16380cbf29a5dec23030995e553e

                                    SHA1

                                    62e7fe0fcf81ab250469ee6c5a89393856dcc3c1

                                    SHA256

                                    6f7e137ea862e054ace2561adfc7c65312b0fbe5b13f51dcec8a303049403b9a

                                    SHA512

                                    f18c70f701d070846bf1e7ad995fb5a959144122ce1fa9f1719952309c6195f39b3c699cf9d59e3c26f7b41a3b697f275bb89c03ac325beacc5fce60a4b45ac4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    186B

                                    MD5

                                    094ab275342c45551894b7940ae9ad0d

                                    SHA1

                                    2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                    SHA256

                                    ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                    SHA512

                                    19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    6ac5731576cc6ed754b4ea636ada28c6

                                    SHA1

                                    3d535d018cac8642e753cf1615558b31d8d09ecd

                                    SHA256

                                    f2a27687103be336417e866a89964689ce030ebd768335e8957c08326dc078ae

                                    SHA512

                                    094a7cd73cf9ddbf74bee7b06cebb91274728d9a9976255e7e70a5d6ae435a7dc73c08c45d33ff618466cf0ce5474f91a4ee1d9dfedb9c0f7f11d7f06057f5fe

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    a14c75bffc8ca5e913c9b8e3711a72e2

                                    SHA1

                                    c9a5d89d7e906ed2b32b7be74586dc7d432ee87f

                                    SHA256

                                    374b91685c0cd19e7c0f45b2778d39f8d9c2d5694df75222d6b374fbba4b81a9

                                    SHA512

                                    10e2a0183a668989e7bd1d4193aa3877fdb66c48ae950c13edaf2c6f49b9574e2f898fbbc9077caf973dc4878438f7dbbdd21d5e6de5f9c70e22d8d7933259cc

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    96c3f95128dcc3df172d6996d608fda3

                                    SHA1

                                    04fd80242a666e2465a4a49eb62a269cb47cea0d

                                    SHA256

                                    237f72a9df331a63e786ca774a5d9db56381ddeee82566f1466acb954613a162

                                    SHA512

                                    07ef63b8f31269868378ddad1f9234862f097973805ef8d0474ad879ad74040122f348c74ab9c45f42b931ace22acfbb16e87031bd5cd312ce06e00c717a53f5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    2cc224ed16d463805293ea846c94d7a3

                                    SHA1

                                    a41c94ed3820da4d3647a8f171d18b339a3808db

                                    SHA256

                                    0d2b3c524b1cfb964f7299deded0a147a8f8593b3cab6bc8913e20c094241209

                                    SHA512

                                    edca9c5ed8d0cb5e55a241817357b4485cf95c9860e9b00cbc002ad317f8c26ffe6dc5085dfa0a34526a6f956258157568d61bb8c82028aee87d2bc17fa0a356

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    56f85bdec97c30ea806e270fe5e2e4d0

                                    SHA1

                                    5ec699894203e01f1b820a2e054172bea50b83f2

                                    SHA256

                                    fefd614ec63fc649e01c560ef12b915766615b7ea8497f26c979aa09b0393607

                                    SHA512

                                    9b44dc69efa5afef0862b9827954142db3618578008b4f17820a304f6535b55205c482c1b97e39b794f31722af8f27e3d0eb65977af77a1fdfbdeab2ca0017f9

                                  • C:\Users\Admin\Downloads\loader_test.exe

                                    Filesize

                                    11KB

                                    MD5

                                    9e0e03231c6f3f54f64aae0ccc31e116

                                    SHA1

                                    0910c6379230ec19b23ed165299f38c6ef9a0cba

                                    SHA256

                                    67e7c523c05dd65024f0a7a3575e4f4c206270c955930370a5123890da00fc33

                                    SHA512

                                    162b23caafe0ef2585c187f49453a41d8547a9766a37ee4b228de76ab1bea4a7a5429cf619f5388613fa75ac6ce8c8a774e13f541d483ad7faed46a3081295c2

                                  • C:\Users\Admin\Downloads\loader_test.exe:Zone.Identifier

                                    Filesize

                                    223B

                                    MD5

                                    2f4ef212ba2cfdb17d3f041053fcf037

                                    SHA1

                                    fb4c27b13b6628f9e33f4f607d82ab33a1880f9c

                                    SHA256

                                    8bcbbde1d7966af005fdde5014d4278124d2a237c8baf9dc9aa7fad6a593ca8a

                                    SHA512

                                    e58c76955ca8219780f37a604f1a97c4e2bfb5e23fdd031828b1e3c45b5d1dd94836e2d3ebcb819a144ee40eb38666e710fa2a046143f37ff187bd9eff2598f1

                                  • memory/2488-72-0x0000000000400000-0x0000000000405000-memory.dmp

                                    Filesize

                                    20KB

                                  • memory/3172-75-0x00007FF4A31B0000-0x00007FF4A31B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-80-0x00007FF4A31A0000-0x00007FF4A31A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-79-0x00007FF4A3180000-0x00007FF4A3181000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-81-0x00007FF4A3190000-0x00007FF4A3191000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-74-0x00007FF4A31C0000-0x00007FF4A31C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-73-0x00007FF4A31D0000-0x00007FF4A31D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3172-71-0x00007FF4A3130000-0x00007FF4A3131000-memory.dmp

                                    Filesize

                                    4KB