Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe
Resource
win7-20240220-en
General
-
Target
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe
-
Size
2.3MB
-
MD5
afe9484dcfbda8d93daa8775c6d7ef4a
-
SHA1
34145dbf531b040bc368a45b6014533bdc531946
-
SHA256
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db
-
SHA512
1e042cba5074042bfad8ba64fe746fb0096b0ebc976303239450d3c1a40da560d0b893b0f2c378a56a691a282d9b77cd52a65fd13e81a7a7e6f499466ef8a006
-
SSDEEP
24576:aQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVkAYA/qV05N:aQZAdVyVT9n/Gg0P+WhoSDCqb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2628-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2628-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2628-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2840-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2840-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2840-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5084-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5084-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5084-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5084-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2840-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/2628-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2628-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2628-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2840-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2840-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2840-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5084-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240599859.txt family_gh0strat behavioral2/memory/5084-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5084-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5084-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2840-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240599859.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_msedge.exe -
Executes dropped EXE 24 IoCs
Processes:
svchost.exeTXPlatforn.exeTXPlatforn.exesvchos.exeHD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exemsedge.exesvchost.exeTXPlatforn.exeTXPlatforn.exesvchos.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exepid process 2628 svchost.exe 2840 TXPlatforn.exe 5084 TXPlatforn.exe 652 svchos.exe 3316 HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe 3192 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 4148 msedge.exe 4460 svchost.exe 852 TXPlatforn.exe 1040 TXPlatforn.exe 2320 svchos.exe 4376 HD_msedge.exe 2864 HD_msedge.exe 4188 HD_msedge.exe 1432 HD_msedge.exe 3676 HD_msedge.exe 2256 HD_msedge.exe 4212 HD_msedge.exe 4984 HD_msedge.exe 1560 HD_msedge.exe 5048 HD_msedge.exe 1620 HD_msedge.exe 900 HD_msedge.exe 652 HD_msedge.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 652 svchos.exe 1288 svchost.exe 3192 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2628-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2628-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2628-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2628-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2840-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2840-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2840-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2840-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5084-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5084-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5084-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5084-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2840-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HD_msedge.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName HD_msedge.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240599859.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 7 IoCs
Processes:
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exemsedge.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
HD_msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName HD_msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exemsedge.exeHD_msedge.exeHD_msedge.exeidentity_helper.exeHD_msedge.exepid process 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe 4148 msedge.exe 4148 msedge.exe 1432 HD_msedge.exe 1432 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 652 HD_msedge.exe 652 HD_msedge.exe 652 HD_msedge.exe 652 HD_msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 5084 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exeTXPlatforn.exesvchost.exedescription pid process Token: SeIncBasePriorityPrivilege 2628 svchost.exe Token: SeLoadDriverPrivilege 5084 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4460 svchost.exe Token: 33 5084 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 5084 TXPlatforn.exe Token: 33 5084 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 5084 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
HD_msedge.exepid process 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
HD_msedge.exepid process 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe 4376 HD_msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exemsedge.exepid process 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exeTXPlatforn.exesvchost.execmd.exesvchost.exeHD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exemsedge.exesvchost.exeTXPlatforn.exeHD_msedge.execmd.exedescription pid process target process PID 2856 wrote to memory of 2628 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchost.exe PID 2856 wrote to memory of 2628 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchost.exe PID 2856 wrote to memory of 2628 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchost.exe PID 2840 wrote to memory of 5084 2840 TXPlatforn.exe TXPlatforn.exe PID 2840 wrote to memory of 5084 2840 TXPlatforn.exe TXPlatforn.exe PID 2840 wrote to memory of 5084 2840 TXPlatforn.exe TXPlatforn.exe PID 2628 wrote to memory of 2256 2628 svchost.exe cmd.exe PID 2628 wrote to memory of 2256 2628 svchost.exe cmd.exe PID 2628 wrote to memory of 2256 2628 svchost.exe cmd.exe PID 2856 wrote to memory of 652 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchos.exe PID 2856 wrote to memory of 652 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchos.exe PID 2856 wrote to memory of 652 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe svchos.exe PID 2856 wrote to memory of 3316 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe PID 2856 wrote to memory of 3316 2856 eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe PID 2256 wrote to memory of 4372 2256 cmd.exe PING.EXE PID 2256 wrote to memory of 4372 2256 cmd.exe PING.EXE PID 2256 wrote to memory of 4372 2256 cmd.exe PING.EXE PID 1288 wrote to memory of 3192 1288 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1288 wrote to memory of 3192 1288 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1288 wrote to memory of 3192 1288 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 3316 wrote to memory of 4148 3316 HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe msedge.exe PID 3316 wrote to memory of 4148 3316 HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe msedge.exe PID 3316 wrote to memory of 4148 3316 HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe msedge.exe PID 4148 wrote to memory of 4460 4148 msedge.exe svchost.exe PID 4148 wrote to memory of 4460 4148 msedge.exe svchost.exe PID 4148 wrote to memory of 4460 4148 msedge.exe svchost.exe PID 4460 wrote to memory of 5052 4460 svchost.exe cmd.exe PID 4460 wrote to memory of 5052 4460 svchost.exe cmd.exe PID 4460 wrote to memory of 5052 4460 svchost.exe cmd.exe PID 852 wrote to memory of 1040 852 TXPlatforn.exe TXPlatforn.exe PID 852 wrote to memory of 1040 852 TXPlatforn.exe TXPlatforn.exe PID 852 wrote to memory of 1040 852 TXPlatforn.exe TXPlatforn.exe PID 4148 wrote to memory of 2320 4148 msedge.exe svchos.exe PID 4148 wrote to memory of 2320 4148 msedge.exe svchos.exe PID 4148 wrote to memory of 2320 4148 msedge.exe svchos.exe PID 4148 wrote to memory of 4376 4148 msedge.exe HD_msedge.exe PID 4148 wrote to memory of 4376 4148 msedge.exe HD_msedge.exe PID 4376 wrote to memory of 2864 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 2864 4376 HD_msedge.exe HD_msedge.exe PID 5052 wrote to memory of 2628 5052 cmd.exe PING.EXE PID 5052 wrote to memory of 2628 5052 cmd.exe PING.EXE PID 5052 wrote to memory of 2628 5052 cmd.exe PING.EXE PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe PID 4376 wrote to memory of 4188 4376 HD_msedge.exe HD_msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
HD_msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection HD_msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe"C:\Users\Admin\AppData\Local\Temp\eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exeC:\Users\Admin\AppData\Local\Temp\HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pc.weixin.qq.com/3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul5⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.16⤵
- Runs ping.exe
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe4⤵
- Executes dropped EXE
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e76846f8,0x7ff8e7684708,0x7ff8e76847185⤵
- Executes dropped EXE
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:25⤵
- Executes dropped EXE
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:85⤵
- Executes dropped EXE
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3560 /prefetch:85⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3560 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2112,12161138030648477665,7397663447907389687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3940 /prefetch:25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:396
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240599859.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3192
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Executes dropped EXE
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
4.8MB
MD5a44e0ffa9441d6505272bb9793e006a0
SHA17d163a07b853657e8f71531b1996002d418cc908
SHA25612fe5bb24b95d768dfdde98b1cc636661f6c33c1957cc2cf8a271b82c70faf62
SHA512551f06123d9b0c9400e22a56a7fa33c4876fdbf0d27ac3402d2acbb9a0bc3b64b52d53f3d783e4e9aa3ae9279300fa6164b9d2ef726cdcb8a7d04aba876c2582
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
5KB
MD55577ae8811327de406875cfd2afd1150
SHA1e2712932f75ff982a90ead138da4e89fd9f017c5
SHA256ecbc02ce8ae052bea10c8be674e3c08a6ddb9a0a177adf760830f7f4b774c911
SHA512996dc27c539bdabe3cf236b1dd0579aca0049f6cc154f9f0dace44df6c558655924cb2f5f0979b8a3c961b753f52788958be6ec69f43e43d35bd503b96d4b7f8
-
Filesize
6KB
MD59b6084706cde47812357ce4fe5aa9866
SHA10a706064510299a033ba5684d802940bdb5c1cf8
SHA2560f8a9b73d7f09e0efd287ba64deac73e742d0c8d050b5e4e9c4f03243087fdd1
SHA5125c681fd4bc2e2693197cbb274c1394d22040b66533d4c6c3555c41ce93c6ea4ee1547c1c6942cacc85c40d257940e1228a74a7cecf07a9521a187ed1d01de403
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5368e0c6612066beac2222643f9fcf959
SHA1afd39de18d4237132f16d6dfbe2d6bfb55f8b7a9
SHA25615888e47ed2c5c35915a29a94ff629e059fd8d81830903e2b68cb1c5fd0bab0b
SHA512afe4fc2b80dc5889a8b151d2adccd0cb4261bb2a86333abac248437b5d3e04da087dc6145fbe6e755274adccccb9a23addf8d220f71d9c9177e018e4474aed3b
-
Filesize
1.7MB
MD575c4bdc11bddb6b0ade5f7ca4471fdc8
SHA1864de34ac0397bae5ab3cc09b56983fec896c0a4
SHA2563b625bd84cbbb8cf9936cfbdf025e55c2c876c588cf281a29e5efdef4749b456
SHA512fd9d3571dc7eeedb0aa8932fdf42f1262d2a957f9894bf647e901e1e50a7ed7ffc6621da3c45213051cac3b216b6ed4cf9ff2dfd4a8895a0e92469d489d73481
-
C:\Users\Admin\AppData\Local\Temp\HD_eb64152bd1f3b3fa887c327d3e3f6af57ed2abf2b4db4ad659cc81d4e3e2e1db.exe
Filesize644KB
MD566eb21741ecfc2a8a53a24d65ec7a40a
SHA16d70532a0b9a1012da004bb78461fff8d9845253
SHA25664cd27f902fdf3e74c2ed74f7640ec000441ef46daffa20416da582e751b18a8
SHA51247289021ab9543a30a2ab647f42619cba048be9c03f4b8c6fbc888bb7167c0cd8868e482114874c0b6c8f02dc48b6e87d22b1c4f04e53a0d20b62897199955be
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5c01afec58aebfc4e6dc198ae2836b780
SHA15b6cf3326ccf758e177b0bdb21fc5a6224db606c
SHA256dee9cbd619cc4771965de7e94181e985d00973cfed236e4ac70393e05ed84447
SHA51286c27824867dbaba295defef35b02cb02acc25e13ec0e7bb15a118be9710ed485bff91f7152fd0084a22dd1ea9e71ecb71edffc14447ab01e211dd4b59faa754
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e