Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
libdts_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libdts_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240412-en
General
-
Target
libdts_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
6KB
-
MD5
f2b0742ea200cf66d85ebc15a4de3d02
-
SHA1
5fcfe16019df7ded8f951bb075dedfb92e756269
-
SHA256
514cd613b662e0425a5e497b67f75f47c4dd781ffdc7269887632954f3b09cb7
-
SHA512
416f1c25b674675ec657f4b0acdec289b96c0fdbd7828b35323bb05f275142d569648b06d34bae2e3a0b88d80da1f5484fef9cb53c12f720b2e8836c47eff1a6
-
SSDEEP
192:ZIpiPMcMHypp5pqpDWp1pbpFXJpOpGB/lo3wpvpIpApmpmpIpDUQE8uI:ZLPMcMHysCX9/0E8uI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 2424 msedge.exe 2424 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1872 2424 msedge.exe 84 PID 2424 wrote to memory of 1872 2424 msedge.exe 84 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 1956 2424 msedge.exe 86 PID 2424 wrote to memory of 3648 2424 msedge.exe 87 PID 2424 wrote to memory of 3648 2424 msedge.exe 87 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88 PID 2424 wrote to memory of 1936 2424 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\libdts_plugin.dll_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd95a46f8,0x7ffdd95a4708,0x7ffdd95a47182⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5708529167567894612,13233861814127671046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD57157713f34d688b6a637e6516218614d
SHA1886a981b81d860071b6121ffe88ec8ae6856eddb
SHA25637afd9eafa914c74cd5348a6788787362a1e69e55b8f87e7ec0edbf73575ff4b
SHA512504d87042253f2a48e18e74a876a731c327e8cee0330f59d56e6eff846c78b9a4d6579a0cae7f7cc170423685300a16958e871edddb596e9a51aebaf96f96bda
-
Filesize
6KB
MD54fc2c999d8cc1b12d26fcb2674e4cf91
SHA199474a5e0cc1bb49b244b361d2d599f2bd3fa49b
SHA256865ff6dc1b198b1bd880782fad29cbf0cdaebf90b1d2cef2f989c2d39cefcc71
SHA512c5b21791066fb57fe3d25af2d6c5799e12f61c330626e979a95700d1944ae7a4bfac5974362b56becaba353de1f87a236df61856a829d97f5918cf54e521826a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58f9492fabc291a8d664f911287795359
SHA1990b48d6bc913a9d44a5079035538e8d24d4f0bf
SHA25682baf20bfe7aebba28210f125dd3e18284ad41c0f36d4c6e2c5de6d5740036f6
SHA512631eb0fe6d5be8f0222e1d10c48caf79190644ccb0647854782abe479c798fcb993452aeeb60223b2ce1fb402e2d051c4e7ba3baef995450bf83ce98d6782a1d