Analysis
-
max time kernel
193s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Haze woofer.exe
Resource
win10v2004-20240508-en
General
-
Target
Haze woofer.exe
-
Size
48KB
-
MD5
0b989cac59f9575163d5a9c9e2b26b33
-
SHA1
3fe0a85cb7478f82b9a095c31097c718c30ac386
-
SHA256
ce2f6e266eab26c92b5451bbdaa069c4bf4a06e8f99be8da0cb29596ac168958
-
SHA512
f4b6a2b8c9fdbd48fabd5645885cf9552ec23cdd0d88e7202ebf62108a0fec86b3c4cb920c32f7ecd737451e863a94196e2809ebbb4b4bf3ce02512e9d1a4d55
-
SSDEEP
768:TbTUiTSqQsP8hEvBBp2HUVWNoNbZwAoIsQrjPQXTH9tHUYc3qeU:/TVssP86v80VWKNb6AoIsWj4XTHrHPeU
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\INF\.NET CLR Data\0000\nescher_2.exe Haze woofer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 msedge.exe 224 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4836 Haze woofer.exe Token: SeManageVolumePrivilege 1108 svchost.exe Token: SeBackupPrivilege 3392 vssvc.exe Token: SeRestorePrivilege 3392 vssvc.exe Token: SeAuditPrivilege 3392 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3356 4372 msedge.exe 106 PID 4372 wrote to memory of 3356 4372 msedge.exe 106 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 4528 4372 msedge.exe 107 PID 4372 wrote to memory of 224 4372 msedge.exe 108 PID 4372 wrote to memory of 224 4372 msedge.exe 108 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 PID 4372 wrote to memory of 3084 4372 msedge.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Haze woofer.exe"C:\Users\Admin\AppData\Local\Temp\Haze woofer.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultd32e769eh8c6bh43c8hbfbdh023e34f08adc1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xd8,0x12c,0x7ffe6ece46f8,0x7ffe6ece4708,0x7ffe6ece47182⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4164093211331874629,13797598353626741633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4164093211331874629,13797598353626741633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4164093211331874629,13797598353626741633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s LxpSvc1⤵PID:5564
-
C:\Windows\System32\FodHelper.exeC:\Windows\System32\FodHelper.exe -Embedding1⤵PID:6100
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:5284
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3392
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5471a5873e865ad73176545e96509f841
SHA11607b14810c9bfa62da2cb315a4742ccaada0025
SHA256b46c1997b8d8b2756d4d6dda64adc01217aec1c5ee23e87b5406c817ac7ab3d8
SHA512d8980ef1cb6e5bf37a4aef6459c466e988de4385dfaf8fe51ad4ff6d21527d71be186a8ea97283d6a1e7858887d62d96350e5f271674a26a1b701c286068d77b
-
Filesize
8KB
MD583141c00386758273ad181c82666a68e
SHA1fcbf7967c8fe7d7e0557b0ead188089db1d4da9f
SHA256d60caafdcb4c50f6c15e107632877a4e5d3b157b5945b41465c82717533a53f1
SHA512475d8ed2f9af7a7449b3c2b5432aeb2c1ca495372c627042582a02a9cb8d480dad13bff3ba64342a90dfb5e35551f04c2b514b090db28236f86211511ea7382e