Overview
overview
10Static
static
7www.DriverOff.net.url
windows7-x64
6www.DriverOff.net.url
windows10-2004-x64
3www.SamLab.ws.url
windows7-x64
6www.SamLab.ws.url
windows10-2004-x64
3SDI_R1750.exe
windows7-x64
7SDI_R1750.exe
windows10-2004-x64
7SDI_auto.bat
windows7-x64
10SDI_auto.bat
windows10-2004-x64
10SDI_x64_R1750.exe
windows7-x64
10SDI_x64_R1750.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 12:21
Behavioral task
behavioral1
Sample
www.DriverOff.net.url
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
www.DriverOff.net.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
www.SamLab.ws.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
www.SamLab.ws.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
SDI_R1750.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SDI_R1750.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
SDI_auto.bat
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
SDI_auto.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
SDI_x64_R1750.exe
Resource
win7-20240704-en
General
-
Target
www.SamLab.ws.url
-
Size
94B
-
MD5
0e1dd474d5e67962ab4d3fbc81e33aa3
-
SHA1
600a0da0d285ca8dd96205be792c277040b2425e
-
SHA256
f234c331d3d80f9984b7737e1d460e702a7c8ef148f46d51f0f9216701403731
-
SHA512
1c864d399399d85b5504af8ededf2619bf2b0d751e670d72872f941b0272df64d117f86c94815ff2277e37e39c69f5dfdd9ce985d046eef204e7d9204c3321df
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3748 msedge.exe 3748 msedge.exe 4272 msedge.exe 4272 msedge.exe 3180 identity_helper.exe 3180 identity_helper.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exemsedge.exedescription pid process target process PID 4352 wrote to memory of 4272 4352 rundll32.exe msedge.exe PID 4352 wrote to memory of 4272 4352 rundll32.exe msedge.exe PID 4272 wrote to memory of 1408 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 1408 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 5088 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 3748 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 3748 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe PID 4272 wrote to memory of 4136 4272 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.SamLab.ws.url1⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://samlab.ws/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd309546f8,0x7ffd30954708,0x7ffd309547183⤵PID:1408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:83⤵PID:4136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:1672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:1648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:13⤵PID:2836
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:83⤵PID:4816
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:13⤵PID:2912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:13⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:2456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:13⤵PID:4788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2486191386447649259,7121452878138378244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5af4873582f95dab9fdc1f35c670bcbba
SHA17c2e365add3b48f23a401d28300871a522661dd4
SHA25600e8da31d867d84aabc186db30aee27b3ea5b87798d25cf8232a2a1405f6cad9
SHA512e75e6485c1291bd43252fcd74bdc0b122de55f791c40f4d412a17116f252d3991f81bf810e9d26e18410620cd8a04b7c2e02be1cd42096e37655ea1385a49f62
-
Filesize
470B
MD5ae1041e24183bbcdfe10ee3158575352
SHA14ee10790288e20038ba2bb0dd7b77a32fda18db1
SHA256a620b0fc50df5d16902a33d721961f934b1e4a283bd356e09c8296ed7ceb6176
SHA512cde8f542f611757ee0a62e5d5578935363f28825e672254fac1e5cc6b983b647e03984ef57c06da8dee7c63f0e166594a89d4ba723501a95a108e2710df12d1e
-
Filesize
5KB
MD519331478fb88728a501fa3be0c8edc38
SHA190957629049e7761558ec52c1e38037e15a6ce08
SHA256f98f7236fb6ea9f903ef99b0b790a1c4d60a97ddb8b6112b53ab3d0bd970432a
SHA512a0e4a4c3158b866216ed3d05070f90e2ef2e30352b232ea39e4714ce0dea6da43d1870d5891cfbe736c5d9ffa88c38fa512afcbbc212119fa8badc9670c9d955
-
Filesize
6KB
MD50396242637c2e563de6bb8c108b1f167
SHA10ba07019ae50f6918d9411293dec04516b92e142
SHA256e71da9a6a40b6c093a3bc646a2adc8ceba9b245c4fe0749b96f48280ce07c008
SHA512092c54d62215530d7ea64ee3d514ae186b6905ea07fee3a72950c44c2e31915cae7ede52be7dfbc8c263ffc7cf95b8c5b3fc584c12af95df0ea0d147f3a0aa77
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51b8c0081fdb601b5d2ed0ced04a88fc1
SHA1a4c0624408700a786a32053bd865308331b62d66
SHA256db89da107579500a1f44388a532e39df8b2fdf46f7c1cc9130d74a16822dc0bd
SHA51214403180bd4e512827335abfef1e802b33f830db6fceda12a7b2fde02794ede75dc50a4e51fd3ba4de9a9a03304df0d5b60f384fc537722432e7c1795ba55619
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e