Resubmissions
23/05/2024, 15:59
240523-te7k5age93 123/05/2024, 15:56
240523-tdkd7sge49 323/05/2024, 15:55
240523-tdaj1agc8v 123/05/2024, 15:55
240523-tcxyxage27 123/05/2024, 15:53
240523-tb268sgd77 4Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/05/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
images.jpg
Resource
win11-20240508-en
General
-
Target
images.jpg
-
Size
3KB
-
MD5
0500e598eddb4be0827bb5d3b778cbb7
-
SHA1
8d7cc4e52ac08960cedde50f1134493217541d64
-
SHA256
aeb766dfb36c9b42f14eb588f49d318fa8e87270f094e6a4a8a031a5e1469fdb
-
SHA512
c9d2600f35cc83e8d1e66c298bf51f405338bee85fb9ff0ae306753c7bba7f73c3fa202e424c2469d242841496a0d827e9f81441edeafbdb4eeca0cf85123939
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 4980 msedge.exe 4980 msedge.exe 1680 identity_helper.exe 1680 identity_helper.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2188 4980 msedge.exe 91 PID 4980 wrote to memory of 2188 4980 msedge.exe 91 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 4424 4980 msedge.exe 92 PID 4980 wrote to memory of 2788 4980 msedge.exe 93 PID 4980 wrote to memory of 2788 4980 msedge.exe 93 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94 PID 4980 wrote to memory of 2064 4980 msedge.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\images.jpg1⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb06943cb8,0x7ffb06943cc8,0x7ffb06943cd82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1598486492684492840,12804803761811509472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:3048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5390187670cb1e0eb022f4f7735263e82
SHA1ea1401ccf6bf54e688a0dc9e6946eae7353b26f1
SHA2563e6c56356d6509a3fd4b2403555be55e251f4a962379b29735c1203e57230947
SHA512602f64d74096d4fb7a23b23374603246d42b17cc854835e3b2f4d464997b73f289a3b40eb690e3ee707829d4ff886865e982f72155d96be6bc00166f44878062
-
Filesize
152B
MD58294f1821fd3419c0a42b389d19ecfc6
SHA1cd4982751377c2904a1d3c58e801fa013ea27533
SHA25692a96c9309023c8b9e1396ff41f7d9d3ff8a3687972e76b9ebd70b04e3bf223a
SHA512372d369f7ad1b0e07200d3aa6b2cfce5beafa7a97f63932d4c9b3b01a0e8b7eb39881867f87ded55a9973abea973b2d2c9b6fc4892f81cec644702b9edb1566d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD53d87878ecd81326c4c96deeaa00bf1d3
SHA1cf64f8da71fbac426ddf53d51b8964fe1c97a03e
SHA25695d9f2ea706e4b3ebe963a9c15a2f3d3614c976a861bb4eccd402f407e7836ec
SHA512b4ae2f98eae06344add1e3a76a0c273399b369e8895b032f22bbfc74462da0b1439b35a07a5e7f09104e2812d46ee7d84b39f573331041a52d52dff43d88b018
-
Filesize
5KB
MD5ce7d3f4fb80c006a158c47f20f7aec1e
SHA14d2d64ce3f3bd5b2b641880a5d13682a046de191
SHA2567dd9c16c35b73dae77d6cf3ea432accd88d74282e736ee2cd095d86e499728be
SHA512014ec93d87c21b56dd84cd086e1218377832277ca760c0ec3796af75827acc40972db34005215fe767a89fccfab962f93961eb7b6ee9048ea3031fad1ebe6175
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e14d21f86febcc8c620a380f32c75f68
SHA149cba603a2ac2eea038bfe02aec8ffc783e5b0bd
SHA25670c2b59c9ccf92d25364b0b1e01bdea70cdf8045b8a32ae3fecdc3d330ecf9c5
SHA5121ac98c5efaf096f98f961aef8250a6345c434d6f47a17ce57e632f62fb26420a1d74b56eb34237556ec4179aecc9395bfaae74be9334d758ca14e357442093ab