Resubmissions

22-04-2024 22:02

240422-1xtwbagh68 10

22-04-2024 19:25

240422-x42b7afa68 10

19-04-2024 03:02

240419-djmthsfh8w 10

Analysis

  • max time kernel
    100s
  • max time network
    115s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-04-2024 19:25

General

  • Target

    1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe

  • Size

    1.7MB

  • MD5

    74a37bb794ed287696eac4495ffae13f

  • SHA1

    0097bc646687e8441db0079c3f85320be39e4a13

  • SHA256

    1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228

  • SHA512

    17770d69d3792f1663d58d2d5c1b1cbcac04ac9ef85c0416bb4f69ca3410b710953f384039999e8719a798bf4cd751226a2282affb7f959197eeccb782126950

  • SSDEEP

    24576:s7FUDowAyrTVE3U5F/9GqKVKic6QL3E2vVsjECUAQT45deRV9RZ:sBuZrEUwzKIy029s4C1eH93

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe
    "C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp" /SL5="$4023A,922170,832512,C:\Users\Admin\AppData\Local\Temp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://yakfrogs.xyz/tracker/thank_you.php?trk=2778
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe71513cb8,0x7ffe71513cc8,0x7ffe71513cd8
          4⤵
            PID:4860
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:2
            4⤵
              PID:4144
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4340
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:8
              4⤵
                PID:3752
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
                4⤵
                  PID:5116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                  4⤵
                    PID:4332
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,6438943179277646255,9884472150948520217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:8
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2548
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1536
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1568
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\FindProtect.vbe"
                  1⤵
                    PID:4620

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                    Filesize

                    717B

                    MD5

                    822467b728b7a66b081c91795373789a

                    SHA1

                    d8f2f02e1eef62485a9feffd59ce837511749865

                    SHA256

                    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                    SHA512

                    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

                    Filesize

                    299B

                    MD5

                    5ae8478af8dd6eec7ad4edf162dd3df1

                    SHA1

                    55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

                    SHA256

                    fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

                    SHA512

                    a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                    Filesize

                    192B

                    MD5

                    6286932b5c04092be1485061dbf0c7ab

                    SHA1

                    7bc617139a688551f8d2a98a2dbef4d5f15eab5c

                    SHA256

                    ee77b5ef8a00d7566b7451262350106365455e9c17e01611db93a3db86a6a378

                    SHA512

                    a2b9b7e1effd8aa5b9686854a45b60162b01da82d824b673171eea871ab857a89fd9d281655336ae0875dfa61845d949b14da4045a894314465f15f1b0ddde28

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

                    Filesize

                    192B

                    MD5

                    668590516acde7aae4a4871cf6fa8258

                    SHA1

                    64f30bb55601aacccb314ae85a0e73882b078157

                    SHA256

                    f7a2d934851b48eacc9f04755526df90545497bae6313c3ea83bafe4ad46eaf9

                    SHA512

                    f76e81272b869febb5650732a5cf067c3dd4867d0c55a7708878807e5ea717423dcafcca6edd3d3166da33ba2f0e2cb49a2692c0b7c145dccef895a5b3829dab

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    21986fa2280bae3957498a58adf62fc2

                    SHA1

                    d01ad69975b7dc46eba6806783450f987fa2b48d

                    SHA256

                    c91d76b0f27ccea28c4f5f872dee6a98f2d37424ef0b5f188af8c6757090cbb5

                    SHA512

                    ae9ba1abe7def7f6924d486a58427f04a02af7dd82aa3a36c1ed527a23ec7897f00b0e30f22529e9599ae2db88e8abc7ba8013b426885aa3c961ee74678455f1

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    0fcda4fac8ec713700f95299a89bc126

                    SHA1

                    576a818957f882dc0b892a29da15c4bb71b93455

                    SHA256

                    f7a257742d3a6e6edd16ac8c4c4696d4bdf653041868329461444a0973e71430

                    SHA512

                    ab350ca508c412ff860f82d25ac7492afb3baf4a2827249ebc7ec9632ee444f8f0716389f0623afc0756f395cf00d7a90a0f89b360acdf72b1befe34eecb5986

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                    Filesize

                    553B

                    MD5

                    2226848a36cab7e52c40efd12b768e35

                    SHA1

                    61772d741f0529cab5bf83437821b37eb267f254

                    SHA256

                    74e4b084313827d1670be1d9433e4e50ef954abee71d68ce0e02d2aaf360f189

                    SHA512

                    01ea1783b05cae5173037abb7b3e6e7779cf84fd80310c727cb753ea0c9ccfc80db0132e11476ebba2859848434581e169b84c78b8d821550083b23467441df8

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                    Filesize

                    6KB

                    MD5

                    5d16212d46c32373ee129639518398d0

                    SHA1

                    1f9748753dae4e59611c08dd8e728475d2d6c1de

                    SHA256

                    5cd8652014e2f2ea73a889770e447f6717ba5d9c4c6eac4f601bb85175acd2ff

                    SHA512

                    1655e7ba5fd190565680c167919950af09e76355deff7231e8eb899249cce51deddf4aa98288e73085766c8fe5fd0a70c9ec4e1b1f1823f774c88d8cba985129

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                    Filesize

                    6KB

                    MD5

                    ef5049ff1f43d5a1b1529c3c83316ebc

                    SHA1

                    5f8f565ac69e1d315f823e70218b952bb3755073

                    SHA256

                    f296acc6acf74a677e3b5da1c8c12064c0769c6539c6eb9c85aebcd1c3faa167

                    SHA512

                    dd590036df3599c87617be22e736560918dc40de821d28af5987df5ddd9c27f81d2934498a65dca612bd6481f185b577b08c8cd9393d208eb32eca351e4cd5a9

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                    Filesize

                    16B

                    MD5

                    6752a1d65b201c13b62ea44016eb221f

                    SHA1

                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                    SHA256

                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                    SHA512

                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                    Filesize

                    11KB

                    MD5

                    24d7450c5f70d81c1b22f7a0206e367b

                    SHA1

                    51f7e846931ff9243cc63003cda48221fdcd4141

                    SHA256

                    4d49b02d94eff775a8c9ea365e047eedc93102b11440a7a86f77254dbc21de12

                    SHA512

                    a34ab719c2e3356565ad6e9db28b53a93f718f4d153f9cf964ed5de9da71b040a699ef9f0521d488020649fe1c449ad63dd7dc1011dfdecefb2c002219ba522f

                  • C:\Users\Admin\AppData\Local\Temp\is-HOVGV.tmp\idp.dll

                    Filesize

                    232KB

                    MD5

                    55c310c0319260d798757557ab3bf636

                    SHA1

                    0892eb7ed31d8bb20a56c6835990749011a2d8de

                    SHA256

                    54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

                    SHA512

                    e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

                  • C:\Users\Admin\AppData\Local\Temp\is-U2FQ0.tmp\1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.tmp

                    Filesize

                    3.1MB

                    MD5

                    29c7863663a6218935710a3f95f69e24

                    SHA1

                    f432dfcf453817fd00c16c035b16be778074e29b

                    SHA256

                    8ab8594026e4bc39b73dd7ebefa28082ab9630efc2c2353357d24830534f0b16

                    SHA512

                    7eb8f9b4f3ec2c7e06bddd74aab3d7a0e860465d34e8551ee728ee3e562d945acd0a06495567f6bccdc11d9e3b5b6f06a452528acacf4f73142caebfe3bcff94

                  • \??\pipe\LOCAL\crashpad_1796_DTOMRUQCKUEIAYGZ

                    MD5

                    d41d8cd98f00b204e9800998ecf8427e

                    SHA1

                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                    SHA256

                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                    SHA512

                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                  • memory/568-11-0x0000000000400000-0x00000000004D8000-memory.dmp

                    Filesize

                    864KB

                  • memory/568-0-0x0000000000400000-0x00000000004D8000-memory.dmp

                    Filesize

                    864KB

                  • memory/568-38-0x0000000000400000-0x00000000004D8000-memory.dmp

                    Filesize

                    864KB

                  • memory/2872-5-0x00000000027D0000-0x00000000027D1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2872-12-0x0000000000400000-0x000000000071C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2872-37-0x0000000000400000-0x000000000071C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2872-27-0x0000000000400000-0x000000000071C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2872-15-0x00000000027D0000-0x00000000027D1000-memory.dmp

                    Filesize

                    4KB