Overview
overview
3Static
static
1_1024社�...��.apk
android-9-x86
_1024社�...��.apk
android-10-x64
_1024社�...��.apk
android-11-x64
_1024社�...��.chm
windows7-x64
1_1024社�...��.chm
windows10-2004-x64
1_1024社�...�.html
windows7-x64
3_1024社�...�.html
windows10-2004-x64
3_1024社�...�.html
windows7-x64
3_1024社�...�.html
windows10-2004-x64
3_1024社�...�.html
windows7-x64
3_1024社�...�.html
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社区手机发布器.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社區发布器2024版.chm
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_1024社區发布器2024版.chm
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码下载1024社区安卓发布器.html
Resource
win7-20240729-en
Behavioral task
behavioral7
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码下载1024社区安卓发布器.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码直达1024社区.html
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_扫码直达1024社区.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_最新BT合集.html
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
_1024社區(PC&安卓)發布器綜合包2024版/_最新BT合集.html
Resource
win10v2004-20240709-en
General
-
Target
_1024社區(PC&安卓)發布器綜合包2024版/_扫码下载1024社区安卓发布器.html
-
Size
276KB
-
MD5
f08a9491ccdb1c4417af843936503c2e
-
SHA1
adeaa1dfbc2da71e4c60237037d82ee3e3b2c1bd
-
SHA256
359d481c0254c70ffc6dcbecda8eb63f503b6c03812c1c9abc55b3584fc1ded4
-
SHA512
f5f55c93ecc5131d7a51ec336c7a7756aede3fa5aa77becf9545304f694326b067d75242384e8cc55658a715ba65a374279f38468d83acb174e1f7cb88518306
-
SSDEEP
192:HakyaCRdfr2a+Zh8NfAkakE7w6rGrzrirSr6+DKAKZQaWy5qbq+TbqkybqbjEva4:H86ZXw6KfuGW+rouWZbZr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5076 msedge.exe 5076 msedge.exe 2120 msedge.exe 2120 msedge.exe 3220 identity_helper.exe 3220 identity_helper.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2120 wrote to memory of 2700 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 2700 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 4596 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 5076 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 5076 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe PID 2120 wrote to memory of 3984 2120 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\_1024社區(PC&安卓)發布器綜合包2024版\_扫码下载1024社区安卓发布器.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98e3d46f8,0x7ff98e3d4708,0x7ff98e3d47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,17083706735922719483,17541641096095205818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD52b026e794f622a088161f5ca34adf812
SHA1c3abf148416cb503fed6dba71624767b5e47a415
SHA256348cb7eb45a8898ad8e8235406f1f7cdc90805944b8b9702fbfb1defdbed6731
SHA5122804ab623369c147d0fe0bf9aff8d83d230ed1d0fccd1fe3bf3674979ece17bed9e113d28561e8805a2be550f316d9ae2bdf7994dc2dc393e4777ff71a7cc02a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD52aa2c75c2458e33f490a3ede9c5877ac
SHA19a91b207768f2368a2b84fd70793b44896fdcb3a
SHA2564b67134d71b816844e819571f0f1a6a26c3b5ff1a5bf76ac1efb1da219cbc17c
SHA5121d83cd195844939d9c81a9b747d781b982a7c4f095909e1de0aacb5aef5831532d5e7d97c20abad0cd596fff92965d46cebf02feab76279a98e7f466b1c07870
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5e16b7938f1a2ee43e7134434659ff131
SHA170e9803f95a0d9efde4c30997eed277302e7c4ea
SHA256db07f4c56266f111ed5ae9824eec63f961e06c91156b85dfaea4bb3605f8424d
SHA51291b1d2d74da84a8fd5b28f44b386e908ba916c22626768bdca8550a5d8f4235ebf9fe8aeaa6819de407d0bb2030cccff386cce0be091d85b41b1bfb6d3692e32
-
\??\pipe\LOCAL\crashpad_2120_FFGKBDRWYTKMOXOCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e