Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe
Resource
win10v2004-20240226-en
General
-
Target
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe
-
Size
58KB
-
MD5
9bd3bfce8e1973af91d13feb3be527d5
-
SHA1
f814778b573db33dac3b13fa7435aec1650189a4
-
SHA256
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453
-
SHA512
dd504fb9d791ba061df11828619cf903caec72d241883748dc409ecf6a22fdeffa3b738348a84d0f715c0c8214b51e1e754258acbb53d8ff2ba39f0384c7dcad
-
SSDEEP
768:+NMbiFKoELVxrcCsUmWkpbrD7GpxkTIzQMBIm6aNGyUwq9JaTovtebSo:+WBoEcCsUVEbr+BZG1CutY
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5A9F9B0F = "C:\\Users\\Admin\\AppData\\Roaming\\5A9F9B0F\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exedescription pid process target process PID 3248 set thread context of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe 4084 winver.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Explorer.EXERuntimeBroker.exedescription pid process Token: SeShutdownPrivilege 3300 Explorer.EXE Token: SeCreatePagefilePrivilege 3300 Explorer.EXE Token: SeShutdownPrivilege 1076 RuntimeBroker.exe Token: SeShutdownPrivilege 1076 RuntimeBroker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 4084 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exepid process 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exewinver.exemsedge.exedescription pid process target process PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 3248 wrote to memory of 2388 3248 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe PID 2388 wrote to memory of 4084 2388 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe winver.exe PID 2388 wrote to memory of 4084 2388 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe winver.exe PID 2388 wrote to memory of 4084 2388 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe winver.exe PID 2388 wrote to memory of 4084 2388 94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe winver.exe PID 4084 wrote to memory of 3300 4084 winver.exe Explorer.EXE PID 4084 wrote to memory of 2396 4084 winver.exe svchost.exe PID 4084 wrote to memory of 2404 4084 winver.exe sihost.exe PID 4084 wrote to memory of 2508 4084 winver.exe taskhostw.exe PID 4084 wrote to memory of 3300 4084 winver.exe Explorer.EXE PID 4084 wrote to memory of 3696 4084 winver.exe svchost.exe PID 4084 wrote to memory of 3892 4084 winver.exe DllHost.exe PID 4084 wrote to memory of 4036 4084 winver.exe StartMenuExperienceHost.exe PID 4084 wrote to memory of 1076 4084 winver.exe RuntimeBroker.exe PID 4084 wrote to memory of 3416 4084 winver.exe SearchApp.exe PID 4084 wrote to memory of 4164 4084 winver.exe RuntimeBroker.exe PID 4084 wrote to memory of 4648 4084 winver.exe RuntimeBroker.exe PID 4084 wrote to memory of 4708 4084 winver.exe TextInputHost.exe PID 4084 wrote to memory of 4508 4084 winver.exe RuntimeBroker.exe PID 4084 wrote to memory of 684 4084 winver.exe msedge.exe PID 4084 wrote to memory of 2496 4084 winver.exe msedge.exe PID 4084 wrote to memory of 2280 4084 winver.exe msedge.exe PID 4084 wrote to memory of 408 4084 winver.exe msedge.exe PID 4084 wrote to memory of 3436 4084 winver.exe msedge.exe PID 4084 wrote to memory of 2524 4084 winver.exe msedge.exe PID 4084 wrote to memory of 4288 4084 winver.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe PID 684 wrote to memory of 3280 684 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe"C:\Users\Admin\AppData\Local\Temp\94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe"C:\Users\Admin\AppData\Local\Temp\94d84e695f60919090f263bffda5613610ffdf97a2e9b4e40d176b462be5d453.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f4,0x7ffd3b3c2e98,0x7ffd3b3c2ea4,0x7ffd3b3c2eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2276 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3220 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3480 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5312 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5324 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:82⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5e1acba25e664db4f5b29a4f53d733a42
SHA13372c405dc21ae7e061e947176041b3414b52818
SHA25640b699f4d64261b9802580be4e723fed50af6e081a6453e2eabbf9c58eb29012
SHA512a9cbb29a0f4543b350951df9bdd3f06bbf9df4871692f87b4e84862e85d5b72305efba0ee886914de6b05075910f2906d75f78ade715240bc70e970a1e31f206
-
memory/1076-30-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/1076-27-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/1076-49-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/2388-3-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2388-5-0x0000000000670000-0x0000000001070000-memory.dmpFilesize
10.0MB
-
memory/2388-15-0x0000000000670000-0x0000000001070000-memory.dmpFilesize
10.0MB
-
memory/2396-16-0x0000000000760000-0x0000000000766000-memory.dmpFilesize
24KB
-
memory/2396-19-0x0000000000760000-0x0000000000766000-memory.dmpFilesize
24KB
-
memory/2404-17-0x0000000000E20000-0x0000000000E26000-memory.dmpFilesize
24KB
-
memory/2404-21-0x0000000000E20000-0x0000000000E26000-memory.dmpFilesize
24KB
-
memory/2508-24-0x0000000000ED0000-0x0000000000ED6000-memory.dmpFilesize
24KB
-
memory/2508-18-0x0000000000ED0000-0x0000000000ED6000-memory.dmpFilesize
24KB
-
memory/3248-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/3248-0-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/3300-20-0x00000000011A0000-0x00000000011A6000-memory.dmpFilesize
24KB
-
memory/3300-11-0x00007FFD5F2ED000-0x00007FFD5F2EE000-memory.dmpFilesize
4KB
-
memory/3300-26-0x00000000011A0000-0x00000000011A6000-memory.dmpFilesize
24KB
-
memory/3300-8-0x0000000000F90000-0x0000000000F96000-memory.dmpFilesize
24KB
-
memory/3300-6-0x0000000000F90000-0x0000000000F96000-memory.dmpFilesize
24KB
-
memory/3416-31-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3696-22-0x0000000000DA0000-0x0000000000DA6000-memory.dmpFilesize
24KB
-
memory/3696-28-0x0000000000DA0000-0x0000000000DA6000-memory.dmpFilesize
24KB
-
memory/3892-23-0x0000000000360000-0x0000000000366000-memory.dmpFilesize
24KB
-
memory/4036-29-0x0000000000AD0000-0x0000000000AD6000-memory.dmpFilesize
24KB
-
memory/4036-25-0x0000000000AD0000-0x0000000000AD6000-memory.dmpFilesize
24KB
-
memory/4084-9-0x00000000775C2000-0x00000000775C3000-memory.dmpFilesize
4KB
-
memory/4084-39-0x00000000027A0000-0x00000000027A6000-memory.dmpFilesize
24KB
-
memory/4084-12-0x00000000027A0000-0x00000000027A6000-memory.dmpFilesize
24KB
-
memory/4084-10-0x00000000027A0000-0x00000000027A6000-memory.dmpFilesize
24KB
-
memory/4084-7-0x00000000027A0000-0x00000000027A6000-memory.dmpFilesize
24KB
-
memory/4164-32-0x0000000000670000-0x0000000000676000-memory.dmpFilesize
24KB
-
memory/4164-35-0x0000000000670000-0x0000000000676000-memory.dmpFilesize
24KB
-
memory/4508-40-0x0000000000010000-0x0000000000016000-memory.dmpFilesize
24KB
-
memory/4508-37-0x0000000000010000-0x0000000000016000-memory.dmpFilesize
24KB
-
memory/4648-33-0x0000000000700000-0x0000000000706000-memory.dmpFilesize
24KB
-
memory/4648-36-0x0000000000700000-0x0000000000706000-memory.dmpFilesize
24KB
-
memory/4708-38-0x0000000000C70000-0x0000000000C76000-memory.dmpFilesize
24KB
-
memory/4708-34-0x0000000000C70000-0x0000000000C76000-memory.dmpFilesize
24KB