Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe
Resource
win7-20240419-en
General
-
Target
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe
-
Size
14.4MB
-
MD5
07a0a8f558b7e8ecaf345fb535a64412
-
SHA1
a8c766173698ce5330264dad00500917d14451eb
-
SHA256
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3
-
SHA512
4478812501cceef2c8335258aacb53b1938cf4a91ce828a89d2a765959d850e42624f2185d0442efe741823d027f0f92b77dc4829d11b7b96125bad4fa614dbf
-
SSDEEP
393216:j7ITUt++UpjEEElpFlpclpclp6lp6lp5e9nN6zYJJyUkds6A:f1UNW2JudsD
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2100-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2100-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2100-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/664-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/664-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/664-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/664-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/2100-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2100-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2100-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240596625.txt family_gh0strat behavioral2/memory/664-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/664-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/664-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/664-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240596625.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_msedge.exe -
Executes dropped EXE 24 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exemsedge.exesvchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exepid process 2100 svchost.exe 1664 TXPlatforn.exe 4036 svchos.exe 664 TXPlatforn.exe 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 5680 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 3960 msedge.exe 3992 svchost.exe 1364 TXPlatforn.exe 2820 svchos.exe 5252 TXPlatforn.exe 5372 HD_msedge.exe 5160 HD_msedge.exe 1584 HD_msedge.exe 5156 HD_msedge.exe 876 HD_msedge.exe 2032 HD_msedge.exe 5036 HD_msedge.exe 5968 HD_msedge.exe 2840 HD_msedge.exe 1704 HD_msedge.exe 5760 HD_msedge.exe 1696 HD_msedge.exe 212 HD_msedge.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 4036 svchos.exe 712 svchost.exe 5680 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2100-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2100-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2100-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2100-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/664-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/664-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/664-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/664-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HD_msedge.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName HD_msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer HD_msedge.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240596625.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 7 IoCs
Processes:
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exemsedge.exedescription ioc process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
HD_msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName HD_msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exemsedge.exeHD_msedge.exeHD_msedge.exeidentity_helper.exeHD_msedge.exepid process 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 3960 msedge.exe 3960 msedge.exe 5156 HD_msedge.exe 5156 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 2104 identity_helper.exe 2104 identity_helper.exe 212 HD_msedge.exe 212 HD_msedge.exe 212 HD_msedge.exe 212 HD_msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 664 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exeTXPlatforn.exesvchost.exedescription pid process Token: SeIncBasePriorityPrivilege 2100 svchost.exe Token: SeLoadDriverPrivilege 664 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3992 svchost.exe Token: 33 664 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 664 TXPlatforn.exe Token: 33 664 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 664 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
HD_msedge.exepid process 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
HD_msedge.exepid process 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe 5372 HD_msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exeHD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exemsedge.exepid process 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exesvchost.exeTXPlatforn.execmd.exesvchost.exeHD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exemsedge.exesvchost.exeTXPlatforn.exeHD_msedge.execmd.exedescription pid process target process PID 1240 wrote to memory of 2100 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchost.exe PID 1240 wrote to memory of 2100 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchost.exe PID 1240 wrote to memory of 2100 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchost.exe PID 2100 wrote to memory of 64 2100 svchost.exe cmd.exe PID 2100 wrote to memory of 64 2100 svchost.exe cmd.exe PID 2100 wrote to memory of 64 2100 svchost.exe cmd.exe PID 1240 wrote to memory of 4036 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchos.exe PID 1240 wrote to memory of 4036 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchos.exe PID 1240 wrote to memory of 4036 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe svchos.exe PID 1664 wrote to memory of 664 1664 TXPlatforn.exe TXPlatforn.exe PID 1664 wrote to memory of 664 1664 TXPlatforn.exe TXPlatforn.exe PID 1664 wrote to memory of 664 1664 TXPlatforn.exe TXPlatforn.exe PID 64 wrote to memory of 1640 64 cmd.exe PING.EXE PID 64 wrote to memory of 1640 64 cmd.exe PING.EXE PID 64 wrote to memory of 1640 64 cmd.exe PING.EXE PID 1240 wrote to memory of 5872 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe PID 1240 wrote to memory of 5872 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe PID 1240 wrote to memory of 5872 1240 a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe PID 712 wrote to memory of 5680 712 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 712 wrote to memory of 5680 712 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 712 wrote to memory of 5680 712 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 5872 wrote to memory of 3960 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe msedge.exe PID 5872 wrote to memory of 3960 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe msedge.exe PID 5872 wrote to memory of 3960 5872 HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe msedge.exe PID 3960 wrote to memory of 3992 3960 msedge.exe svchost.exe PID 3960 wrote to memory of 3992 3960 msedge.exe svchost.exe PID 3960 wrote to memory of 3992 3960 msedge.exe svchost.exe PID 3992 wrote to memory of 4428 3992 svchost.exe cmd.exe PID 3992 wrote to memory of 4428 3992 svchost.exe cmd.exe PID 3992 wrote to memory of 4428 3992 svchost.exe cmd.exe PID 3960 wrote to memory of 2820 3960 msedge.exe svchos.exe PID 3960 wrote to memory of 2820 3960 msedge.exe svchos.exe PID 3960 wrote to memory of 2820 3960 msedge.exe svchos.exe PID 1364 wrote to memory of 5252 1364 TXPlatforn.exe TXPlatforn.exe PID 1364 wrote to memory of 5252 1364 TXPlatforn.exe TXPlatforn.exe PID 1364 wrote to memory of 5252 1364 TXPlatforn.exe TXPlatforn.exe PID 3960 wrote to memory of 5372 3960 msedge.exe HD_msedge.exe PID 3960 wrote to memory of 5372 3960 msedge.exe HD_msedge.exe PID 5372 wrote to memory of 5160 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 5160 5372 HD_msedge.exe HD_msedge.exe PID 4428 wrote to memory of 3972 4428 cmd.exe PING.EXE PID 4428 wrote to memory of 3972 4428 cmd.exe PING.EXE PID 4428 wrote to memory of 3972 4428 cmd.exe PING.EXE PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe PID 5372 wrote to memory of 1584 5372 HD_msedge.exe HD_msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
HD_msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection HD_msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe"C:\Users\Admin\AppData\Local\Temp\a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exeC:\Users\Admin\AppData\Local\Temp\HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://support.qq.com/products/285647/faqs/886453⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul5⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.16⤵
- Runs ping.exe
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe4⤵
- Executes dropped EXE
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5372 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67ff46f8,0x7ffa67ff4708,0x7ffa67ff47185⤵
- Executes dropped EXE
PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:25⤵
- Executes dropped EXE
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:85⤵
- Executes dropped EXE
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:85⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2160,17637444744740342689,9208168140256649281,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:4296
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240596625.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5680
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Executes dropped EXE
PID:5252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
4.7MB
MD57833c63afd6c38927ec6b66ec18a2f8f
SHA17fbd7b8ba7eb611df17ed2363ad7fc4b07be0432
SHA2568f31934a63450e1d92332c3823e81187fb260cb6c5d4742ad46572e1c75398c8
SHA51268ced9bc9d1f9b16f6656b63274249e09564c9843d477e81214f7d0be291f0ac17fdc8140b2b43a5b0e90da5af602cdd94a3c568c1958a45d094bb0754c53a40
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
5KB
MD5d8acc4b2fb0badfe9e5da4c6cda1ab51
SHA11788e4ec1070090cc7638cc10423a2c10379a70a
SHA256a414222b19619bbb27362f57a247753eabfb04321dcf12f5b6eeb825010a09e8
SHA5120a5dd195281e485cf064fcea295edbe80052bb7db92715a7d6f2c5b91d12899231e2c0ce5c1bda5274c3964a9fb8abb4cfcbd8f204fb269684f5a4d354226e67
-
Filesize
6KB
MD5636e3cfffe3d9ca1c97a3cf4d9422b01
SHA1a5642facbce895a13a0dd436a002c9e8bc9967a4
SHA25632df102281bd624747354a1e7cc270875bbcaa7a6f6d9c06816c712e09575091
SHA51291626a3a1d87ecfa3d25e0915ecb4d405584a61a96869a70f80c8fe493bdca5b86f9310b7bf52035893c7f6f002daf21e6744c5f91426a00580344e127fdf4a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5560335e011c9b754bfbee78204609bdd
SHA1727d2cd33ff00954ec4c2a60b43fa84201707441
SHA256e6ee0d46817ffb3d28112a5f63e7fea1f1c3367342252e23309e5d60f7729a6d
SHA5128f78f0d2eb1cc75fa4292c1358bda03e0b2ee0b8501896390b2f6840a434e4d988d41d820876ac4718075d85391265592ca53bea37ef60a74f441bc20949c771
-
Filesize
1.5MB
MD56e63c6b990dce1307432d21aa52ec946
SHA13c14653ed90f7201e7acd329a31a4050aae01998
SHA25621d91ffeea7893738543006d409964139aae06428e7ccae1e73555ff4c81f44e
SHA512989e55bc8ef4f05f945ebe44db3a9701a195d1ba35c2cdf848ab1205d61fc4035593bd753377cd2f4125f7801276520accb297e633cd32d1cd1faceb6e9130d4
-
C:\Users\Admin\AppData\Local\Temp\HD_a3d2cb0b4b9fe16ec0bb19f7457669e193af993e3e7940f76c209cfe5cfc7bc3.exe
Filesize13.0MB
MD599348b730b90c4f4ef8500b14f655a22
SHA17bfe3779376671fc878c84ab079d8469d32849f0
SHA256879455b926f644616b0b5241d3516cf6b9744c2557ae211920ca0407ea7492f2
SHA512041ecfa94e0b47e23d08f2fc27440fb74272b6eaaf250e2be2aae53dfd6c463bfb0552da4afda0a99b9d4ca95b3b2dda55f8ed4cf16e5595822b0700c01efc75
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5c77d91c4d1c48d939191514dd1297856
SHA12e2235ddeb2993d02facad20f299aab72c2c23aa
SHA256d0729244d3eea8d7e644b5bb67d6faee63aed403aa8b6dfc3a4222d34ab664c6
SHA512eec0fee413328a9de8c20e3dd22520bd6a20a8251f781c74aa00e8b93d29bcd003f518c38a1ffd1498a031d481ff5b1c39eb6980a6e2b64b263533c766bb5001
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e