Resubmissions

18-05-2024 23:38

240518-3m5aeaed2w 4

18-05-2024 23:38

240518-3my4dsef79 4

18-05-2024 23:35

240518-3lbxgaec3s 5

18-05-2024 23:35

240518-3k6qfsee54 1

18-05-2024 23:33

240518-3kab9aeb5x 1

18-05-2024 23:09

240518-25gfmada3y 10

18-05-2024 23:08

240518-24yzaadd48 5

Analysis

  • max time kernel
    148s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 23:35

Errors

Reason
Machine shutdown

General

  • Target

    http://arc.net

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://arc.net
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba24718
      2⤵
        PID:2500
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
        2⤵
          PID:1168
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1416
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
          2⤵
            PID:3968
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
            2⤵
              PID:512
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
              2⤵
                PID:4584
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1
                2⤵
                  PID:1052
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                  2⤵
                    PID:4068
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1436
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                    2⤵
                      PID:5088
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                      2⤵
                        PID:888
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:1
                        2⤵
                          PID:5540
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16741190879653656843,3204371232891412101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                          2⤵
                            PID:5548
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3780
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3020
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /7
                              1⤵
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:6048
                              • C:\Windows\system32\mmc.exe
                                "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                                2⤵
                                • Drops file in System32 directory
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:5612

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                              Filesize

                              152B

                              MD5

                              ae54e9db2e89f2c54da8cc0bfcbd26bd

                              SHA1

                              a88af6c673609ecbc51a1a60dfbc8577830d2b5d

                              SHA256

                              5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af

                              SHA512

                              e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                              Filesize

                              152B

                              MD5

                              f53207a5ca2ef5c7e976cbb3cb26d870

                              SHA1

                              49a8cc44f53da77bb3dfb36fc7676ed54675db43

                              SHA256

                              19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23

                              SHA512

                              be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
                              Filesize

                              288B

                              MD5

                              0521deac060c735835fb9df574da7024

                              SHA1

                              c4078b032931a3af5023a2740325d34ba7a83b19

                              SHA256

                              df071b889c33e3330ff0e59d5ca7f256a25c7745a8efe1c7be8c5d05209198f0

                              SHA512

                              6b9150ed847ba4a9da47160b35941614d9dfaaa8364e9d90a757e5dbdf07113fa54bded6667a06d058802fe317e6d14c032e02317b2e54f7aec718a72df9c1de

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                              Filesize

                              175B

                              MD5

                              32decc01d47603f2f3c10d947a7d2e0e

                              SHA1

                              6cdb26fc64e1fde0ae0dba0148c515b8c0940766

                              SHA256

                              965ca00b20dbe582a2cae2b3d445d4dcae032aada222ff632cc32aadadd21db9

                              SHA512

                              0c439113b5a7ba8b594db36a7968ffdb2152f0dc7bfcbb9c810358700ab58142e87cc0ab1bb7e696a8a78adeaa2b4cef7386ee39e892adf9e7df107e9a74cbbb

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                              Filesize

                              5KB

                              MD5

                              f2ecb3695f4de6d994aeff827824f5c3

                              SHA1

                              fb27e49ce549dc1e1774c6e8b2501de397fbb4a6

                              SHA256

                              088236ebbc872620b8b1caa862b589b937babbfd75c2b5f096149f41d3b48bb1

                              SHA512

                              2e52c9dc9923db3f6d088c7e3cd58fbdfbc5bef11dbe534d3a818a2224dbe8517bf3ef12dbf3ddca8d5385fa2b035b09ecb881b0dd731c2de0806c6210a6a33a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                              Filesize

                              6KB

                              MD5

                              3d9fd539eb2557acc89046d8f577c5e6

                              SHA1

                              bf1c02bb86e10f2790f3c13d5405287aabd5b06d

                              SHA256

                              1d806190dc5e6ed42b10a513530a1cdd4a33c5b4db47994b210ad179447a0ccb

                              SHA512

                              b15dd49dd4085d317eb1a2305a68c1135a40f7cc7373786031cf1606da158e9a51854d379331cc27f730d5f9fdf7143f6aaef0266299fccdc441a25865774509

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                              Filesize

                              6KB

                              MD5

                              adb3a499ca15e794b07ab1343238bea4

                              SHA1

                              99357d1e0193b70720b1a2a8e5b257dcd813b81c

                              SHA256

                              bd045434172e73a098d941af290f0ded81a33d1a440c11d8d6482f1c9a28c64b

                              SHA512

                              f04ffc0dde58728791d591a5fe38f4c5525b6c91d2535ea94bd1c886f40ec53f6967838ae8bb09abcb07de61551351a1ac127ae42b12d2e2fa03a560169248f8

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                              Filesize

                              11KB

                              MD5

                              a5fd3e7ee3f76473e08dd1408cff0d29

                              SHA1

                              ee981c0cc67bdf34b5da6680598001209c81e952

                              SHA256

                              817a9999a90361f2ae075c1e3c06cc42ede526c1da4669bec412e48e5e3111cf

                              SHA512

                              a7177276ad384161e2a2a1b93ea18b6b469ee84786ee6cf605ff9d6b881eef6b39254a554865132de7c5bfab2567ece77bc1fe8fe506f77721ef3b1aa0794cef

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                              Filesize

                              11KB

                              MD5

                              94003a67405dd175ae8d3dd7e814e94d

                              SHA1

                              4ff7327bf4f89c5c8f5652c9d5cfb961a4743a3d

                              SHA256

                              9987b46e68292bfd8f69cc93d798b86fb67f35d85958c9608b505cb8a450b8f8

                              SHA512

                              b5a11fae90b9cd8a5116bc341a9262edc739654f7408651bfd7178476ebf2d893bfb591ab93a887158f2ce43c8c410bf86eb30276114eb8da4effbf1438eca29

                            • \??\pipe\LOCAL\crashpad_1704_MJTBJYGNVNXQDJGX
                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/6048-125-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-123-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-122-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-120-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-119-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-121-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-124-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-113-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-114-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB

                            • memory/6048-115-0x0000017451230000-0x0000017451231000-memory.dmp
                              Filesize

                              4KB