Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
Psycho Hatcher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Psycho Hatcher.exe
Resource
win11-20240611-en
General
-
Target
Psycho Hatcher.exe
-
Size
2.0MB
-
MD5
5d77b937d0fd2e1a2c545e1ae3af3c66
-
SHA1
74a7b1f97e13d6bfb727115105ca59311e360b28
-
SHA256
be65e7de6acc9230109ff799fb73ac07de8929fb50ddd47173a49b8aeb667a68
-
SHA512
ba2b015793b37d14ae760ea22cde29f10924befc6defe5b517c4f4a80907c25425f0962ca4185a9ab57af3609c966b41311cdd2a03a8516e0352f4c6b7115038
-
SSDEEP
24576:0976zTA97z+1e38xyVdXQREt+71e0irMwTuLD/nJYs+OfJSjQIi2EsbblmAddQs1:Y7+kagLVdgRvlirnu/nD+dLVhu+u9ap9
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 1592 msedge.exe 1592 msedge.exe 2104 identity_helper.exe 2104 identity_helper.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 1592 4960 Psycho Hatcher.exe 81 PID 4960 wrote to memory of 1592 4960 Psycho Hatcher.exe 81 PID 1592 wrote to memory of 3144 1592 msedge.exe 82 PID 1592 wrote to memory of 3144 1592 msedge.exe 82 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 3000 1592 msedge.exe 83 PID 1592 wrote to memory of 2568 1592 msedge.exe 84 PID 1592 wrote to memory of 2568 1592 msedge.exe 84 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85 PID 1592 wrote to memory of 4940 1592 msedge.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Psycho Hatcher.exe"C:\Users\Admin\AppData\Local\Temp\Psycho Hatcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x86&rid=win-x86&os=win10&apphost_version=8.0.6&gui=true2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd82e23cb8,0x7ffd82e23cc8,0x7ffd82e23cd83⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:23⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1404 /prefetch:83⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:13⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:13⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:13⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:13⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5520 /prefetch:83⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:13⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6268 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:13⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:13⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:13⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,14128831108707847707,15928556646945579632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:13⤵PID:3476
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59a91b6dd57fc9c4880d34e9e7c6b760f
SHA177a09da6ef4343a8b232386e000cd2d6b9fc30a3
SHA2560170297f0103d4e415653f86dedc31b0827580042f86862206fd3f6f135b543a
SHA5129fc3b9be931b3edebc4a6809d62d805046bdceb4c27a7db21cfbbcb0e5e253ab529c54d64e465e60904a6ab3b83156e26b97f852c9526f46f037944f806a7f0f
-
Filesize
152B
MD5bbfb66ff6f5e565ac00d12dbb0f4113d
SHA18ee31313329123750487278afb3192d106752f17
SHA256165401ef4e6bbd51cb89d3f9e6dc13a50132669d5b0229c7db12f2ec3f605754
SHA5128ea206daabc7895923f3df9798bfd96f459bf859c78f3e5640fad550678b5090539f2a1b590883cd9797efee999acccac16d499772f61f5390e91bcc44d60560
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d0ce4033be0ac776fbb5a7341d39d475
SHA113f49874c6cda0833752778dbc96abcc14212887
SHA2567e91ab6c33cb2f02fff143e9f3c25ece46583ebba47ed4dfe2183bde20324504
SHA512949115a57d2a14d0b2e947f6b540787434defd2381e5e4b919f8e3cbb71a9ebe6e700733073d0bc61ec0c6b321c776f9291875e2783a460e4fca6b66ddc0851d
-
Filesize
6KB
MD582ae1da1233fbbe491c2b7cc07424a6c
SHA1be31e1b9ec2d9c296de2d5252087adf337e91df3
SHA25632829d6e90fc19155aca5ec0007c8bb4a16c6d0c0104829d70e2476124eab592
SHA5123eb345106c503e1c06a1920a0d209a69d5377ed0832a83ebb1a14b0871b957f67d54ee708b4f3e1f4fdd72bdb44f9b7ecc1f655a1f14ab6251b4ac45b22828f5
-
Filesize
6KB
MD59a21b7fd54e321d4089a6cbafa9efa6f
SHA1afbf61f05013f4022b9ace356b03ec3358c193a2
SHA256c8b87cc46dc9d7864b55ae1709cdbe81699977205d62f7530900f4f4b3ca1cab
SHA512d6cabce17d63b239fd6184225ec3e70c8fcd07042949ed9242c883457c14954762dd9b67f191c5abf9092b7d7b6226aee4cb80b47ec6965dcc7c5f0e24c5c120
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ee45b8e6b5134e48686df5696e39307a
SHA1e701fd4854303cb20596469169f6d2c92451aef5
SHA256b9504470d12d4cab827e6c34199c72675eec358a0bfab5f23b273419c7175c9a
SHA51288f175dcc651ab746e2c5e49ba7af18e0a8b188d3d5f9a422e34edb85df8c55a5c56e52aa0db0e13a3aaa50a543ddca0c9259a4fff3ed43cab6403bd5645386e