Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:35

General

  • Target

    9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe

  • Size

    175KB

  • MD5

    b0762cb364c4a6dcaf988e98769222a2

  • SHA1

    383306a9f9e8adc5f893ff3913131e6610525c95

  • SHA256

    9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d

  • SHA512

    6e2ca96e53ffd5d89d7b800f21c7636b87935fcd8261aac4a936c96a0a3e103ee9704f7cec541c0babfc6ba66e7882d44ac4f7037219ac07c6e6e6273d3056ef

  • SSDEEP

    3072:KNy+bnr+O1R5GWp1icKAArDZz4N9GhbkrNEk1pRroMK6y6S+:KNy+bnr+2p0yN90QE6KMlz

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
    "C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exe -snpk:"4983000338,TXBQ9-J7PF2" -install:1 -requestID:"951147" -silent
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://activate.rockwellautomation.com/
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff8fc9846f8,0x7ff8fc984708,0x7ff8fc984718
          4⤵
            PID:1584
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
            4⤵
              PID:4732
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:880
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:8
              4⤵
                PID:3668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                4⤵
                  PID:4156
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                  4⤵
                    PID:2624
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:8
                    4⤵
                      PID:4068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:8
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4856
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                      4⤵
                        PID:1516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                        4⤵
                          PID:924
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                          4⤵
                            PID:3920
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                            4⤵
                              PID:1568
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:2
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4244
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3924
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2440

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            439b5e04ca18c7fb02cf406e6eb24167

                            SHA1

                            e0c5bb6216903934726e3570b7d63295b9d28987

                            SHA256

                            247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                            SHA512

                            d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            a8e767fd33edd97d306efb6905f93252

                            SHA1

                            a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                            SHA256

                            c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                            SHA512

                            07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            1KB

                            MD5

                            ae8d4ca842a734256104fb5a29002832

                            SHA1

                            e348df1a4dbca942573d19e3deac8057fbc5efe5

                            SHA256

                            ba82d861e45da700d9e6c468bad9f239683db48af502a69b1b730040c963aa88

                            SHA512

                            465f7258f8c0c256ad3d36f408b32fc74ae0195e777f367e395443ae442deb67378e12842b567d9039a5177aaacdb4f79f0abcb7d45b1e6873ccdba1c182b266

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.rockwellautomation.com_0.indexeddb.leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            2984d381e321afefc19378ce5a81f003

                            SHA1

                            c674a6d8096378b04cfc8c35203eaac06ce057b6

                            SHA256

                            be2d9a1909a702788f7e8ee7751b6d05fae0595db042c4998f30f1a9f879c710

                            SHA512

                            68f97270f1f580d814d171a5c26f7e1a435d08462915abafc1b5eeab55ce966aaa47043754d72d231bd495105bd9255fe771e5148f39b4805a725c4de09d3124

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            360e5ace9820b68900eeb2410a6b71f1

                            SHA1

                            5143eb6059b28b77ad453575e4d3088095cd2ec2

                            SHA256

                            220c9bc5848560fe94200baaaa521464dbb2f1c4f2917944b3cc0893fd2451e8

                            SHA512

                            2667a3355f4290efd93a5cb5fc1d3b8ef3396ff953723c0c6ecd47f8e07e81d5c61b12f24814cb0d524243001f000e4d8295980462229ee05f5ea5c3442c71cc

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            7KB

                            MD5

                            7e05f3de9639b2400911fc3bda80bf68

                            SHA1

                            ec21c9373cd8fa7b1a7c1bfc47902f1854977082

                            SHA256

                            39759d3ced6ff09466f8afe9abbc7a18b62e7abbdde4462c491d67126c15e4ab

                            SHA512

                            980b5bcb68153eaafc56eb1ab7d72b4dcc7e63d59c5f272f4bb0d42926095a8b5a182dbe13e13b7e6d8df36baa95523afcf653b89210cbca2e37cf373af9a2fb

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                            Filesize

                            72B

                            MD5

                            4b7f9817f2f7c473e3b632488f179c8b

                            SHA1

                            3c54b41399e676f8387075944f11c75fced2e915

                            SHA256

                            152b6b4b68f378ae2d194fc7e30a7c82eca32dfd8c3d27404082f6e5f8a71a5e

                            SHA512

                            2b249a4940087fc4fceaf15d9edd3c5564f59f874ab0efc9ce2d754cbf23de11137f3b66c2f3a14eb285b7b48ab31f594a315a90f0856ded8ded2eba61d0f0f1

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ce2d.TMP

                            Filesize

                            48B

                            MD5

                            facae005e82116bc24a24e0668dfc103

                            SHA1

                            905965f969f47d4a808a112143e4545a26da9902

                            SHA256

                            8a4b64feb9c32c58cb075c8c42b7a15ed43b441fa9a3d2addfe4f3a8ff170c28

                            SHA512

                            6a62dfbc0c921842ad3305048f6e4f93cdc63851e9be5456a6f55b6cf21884b24cfce953c503856585f8f9f175dd1ff96bffcf721a42429cff647d7c0c0db1a8

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            11KB

                            MD5

                            6c60ece0e619070eb19791127417991f

                            SHA1

                            389cbea07c084257987e8745eec29e2006a2e30d

                            SHA256

                            2ce834d8cd645260dbc1f2d767b7c5f06c6800bb4e64627439c1eb96224c4de4

                            SHA512

                            6505da9c4ac5d15fa287036e80639227a2a968b58972ea91ce4598dcab7895ece63a3eb1c834b67ef02797be887026f4792d79a4dc8f821876f62a33f0805c8c

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exe

                            Filesize

                            19KB

                            MD5

                            b5e74e72395095e7804555f8f53cb96b

                            SHA1

                            2282e82dfb283581704dbaf36c71a979eb7520ba

                            SHA256

                            6a3dc087a1de33c527eb6e307ec2853ec14456f1d62ada55a36974fb2a3fc158

                            SHA512

                            0ee5e9d7c70bc71f3e0d5bab01223a49bc96bda63aee479f06acb9864855b04a1a6aa668e5966a58e56cfcd7d83651b89d501c2c583b58094fb60479e0de1c86

                          • memory/3316-9-0x00000000053F0000-0x00000000053FA000-memory.dmp

                            Filesize

                            40KB

                          • memory/3316-8-0x0000000005240000-0x00000000052D2000-memory.dmp

                            Filesize

                            584KB

                          • memory/3316-7-0x0000000005750000-0x0000000005CF4000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/3316-12-0x0000000073610000-0x0000000073DC0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3316-10-0x0000000073610000-0x0000000073DC0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3316-6-0x0000000000970000-0x0000000000978000-memory.dmp

                            Filesize

                            32KB

                          • memory/3316-5-0x000000007361E000-0x000000007361F000-memory.dmp

                            Filesize

                            4KB