Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 09:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1255540700443971727/1260530193307668480/SpyderCrypter.rar?ex=668fa7b9&is=668e5639&hm=92b31f190a9ebd81bb37b0bd2c40f92d8cf244a82108132ecca2cad4195e55a3&
Resource
win10v2004-20240709-en
General
-
Target
https://cdn.discordapp.com/attachments/1255540700443971727/1260530193307668480/SpyderCrypter.rar?ex=668fa7b9&is=668e5639&hm=92b31f190a9ebd81bb37b0bd2c40f92d8cf244a82108132ecca2cad4195e55a3&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 4452 msedge.exe 4452 msedge.exe 3332 identity_helper.exe 3332 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4452 wrote to memory of 404 4452 msedge.exe 83 PID 4452 wrote to memory of 404 4452 msedge.exe 83 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 2888 4452 msedge.exe 84 PID 4452 wrote to memory of 3024 4452 msedge.exe 85 PID 4452 wrote to memory of 3024 4452 msedge.exe 85 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86 PID 4452 wrote to memory of 2928 4452 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1255540700443971727/1260530193307668480/SpyderCrypter.rar?ex=668fa7b9&is=668e5639&hm=92b31f190a9ebd81bb37b0bd2c40f92d8cf244a82108132ecca2cad4195e55a3&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf49b46f8,0x7ffcf49b4708,0x7ffcf49b47182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2081005773251253039,18085309306580529360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD54d571d0603fff7c65e4eaf5bb1e5ed56
SHA1f0ceb497afcc93ae1873855538d69a85f7cae1f4
SHA2564325f57bbdd8315c60fb42ff3f12149a61bff5f2cabf611712b7c5bdcc2987e9
SHA512e3bb2a7d48b4215f3d1704ff94261ff1d7214df08bf4b0032a8a170b54399ee3f4d7d9790d374777f887dff39c7f83b927047f1448a6ee57d1c643b3ef8ee0f7
-
Filesize
6KB
MD5f7ee8514c4faaa6ba3a870127dcebe19
SHA1785b00e5b522a48a1c0ce0fd6355f691e1a9e3dd
SHA25667a2772a0d0b16ea3d209ee661b067cf62d6eab73bd2fd346e8003dad1da55e0
SHA512e9bb10cc8753d07cc339775117eaaea9356996c2b5a28ab2285c1aadb1dac326d7861238c913e106e5c5f8831cb657b3bd70b660d384cf3d2b8230b3f6b70986
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50fe857b94fc358bb39ef3ebf4b322cc4
SHA1c52cb9955d14abc138657a7057913addd5a22f38
SHA2560fb14dc84bc4b042622baa580789879cb7c334423cd04ea9dc3fd6d151532eb8
SHA512a9e18b0262209648a322abc4cc251aebf61919e4906dd45f61688d9c3ecb88e56e54209d5d21cb7121bf1bbf4cf4a3537f0456588d633486b687b4ec3908d5b9
-
Filesize
5.4MB
MD516c36d6a30dd6a91d09f3eec38dc541f
SHA1e383dd98cbd917e6cf7bb5bcbf769403a8c358dd
SHA256223fa09fda2b27b65aa367af7747d635a13f412bcff84ab38356204ef8a30fd9
SHA5126f330018dcefb8c12d84c90a35dd23e8694150ac4f34151bf4118e209175d53d96fba498496e5806bff26a562418f4ce662f59ebb3f284309f92458351a7bf04