Overview
overview
1Static
static
1_1024社�...��.apk
android-9-x86
_1024社�...��.apk
android-10-x64
_1024社�...��.apk
android-11-x64
_1024社�...��.chm
windows7-x64
1_1024社�...��.chm
windows10-2004-x64
1_1024社�...�.html
windows7-x64
1_1024社�...�.html
windows10-2004-x64
1_1024社�...�.html
windows7-x64
1_1024社�...�.html
windows10-2004-x64
1_1024社�...�.html
windows7-x64
1_1024社�...�.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社區发布器2024版.chm
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社區发布器2024版.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码下载1024社区安卓发布器.html
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码下载1024社区安卓发布器.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码直达1024社区.html
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码直达1024社区.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_最新BT合集.html
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_最新BT合集.html
Resource
win10v2004-20240709-en
General
-
Target
_1024社區(PC&安卓)發布器綜合包2024版/_扫码直达1024社区.html
-
Size
375KB
-
MD5
ef0a7aee719842f4c90981cfbc62b2c7
-
SHA1
2d9297e9456565123de87ba12d079ba62d5f01a3
-
SHA256
7ba711605626548410f25a24fa5b356a9fe98858e1030b09226db6f291aec23c
-
SHA512
d28a271abaf7f38223bfd729d458e68bb5c0f75a7e9a17b79313eea100139a298e90cbb2ddae20ebce5035e4ded02a9ea12139e0b25900f0d2b6142911b6eb15
-
SSDEEP
192:na+Xa+zaE/7w6rGrzrirSr6+DKAKZQaWy5Cx+vxkcxbjEva+Ea+a:BRTw6KfuGW+roRm8a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5092 msedge.exe 5092 msedge.exe 1012 msedge.exe 1012 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1012 wrote to memory of 364 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 364 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4748 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 5092 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 5092 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4932 1012 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\_1024社區(PC&安卓)發布器綜合包2024版\_扫码直达1024社区.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce39546f8,0x7ffce3954708,0x7ffce39547182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16878970908753706853,16838261376596208552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5ddb8ee468d1d4075006fded2038cdee3
SHA13c56dda8cb986c177191d1d64c3b7500b911e859
SHA2563a322d574eba0dd2e5b1739499aa46d79e32b14d6e4b405fe487d4b3f28d0be8
SHA5125384db309578ad31c8d052d2af45fc7af54e3abf30aabf3f08da109336098c9fdbc8ca0d17551594a31fb182e61e5d0c772f80d8c0b5a091d629426277897f11
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b4031ac70cf0273d5c9912cc001b8307
SHA1395e80e64f98d099310f7ffe6bba23a86826bfd6
SHA25655a877592d276e64be73d5686ad70aeac4d2e972f6fd6dc7a7028e26ab1948a7
SHA51292e6b83832eaa6498d5cf436aa87e0762e6d2bedba7a6bb0976aa868b19a7cd8a22bb555c8e0e217a3f3b50843869152d0f18d6c8831f96b01412a79222d1126
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD59270475be2eee433188582e361fa922b
SHA1824608d8bccdf9b785ea6bcfcf4cd89fcae93ffe
SHA2562cfb1a64826a66fd90ba97a55d125fabd359ef6289d6204f0f236323497f32c9
SHA512efd642715217d6a748d6ded8a47b3562903bb0d40776e4255412a75f6e086456cbaf6c9e47505c6fb5d4e8ab596d6447f378098fd8334fb9cca0255048d1c853
-
\??\pipe\LOCAL\crashpad_1012_KCTSGGNHWZNMQFFAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e