Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1265468121448185966/1265472444492283995/WallbangPakMaker.exe?ex=66acd74e&is=66ab85ce&hm=6f333cf6f7c08c84a68d7b06ef20fb793c030ed44c24ccd41ff6d683de7e5943&
Resource
win10v2004-20240730-en
General
-
Target
https://cdn.discordapp.com/attachments/1265468121448185966/1265472444492283995/WallbangPakMaker.exe?ex=66acd74e&is=66ab85ce&hm=6f333cf6f7c08c84a68d7b06ef20fb793c030ed44c24ccd41ff6d683de7e5943&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3089151618-2647890268-2710988337-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 584469.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 60 msedge.exe 60 msedge.exe 1848 msedge.exe 1848 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4572 1848 msedge.exe 83 PID 1848 wrote to memory of 4572 1848 msedge.exe 83 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 1096 1848 msedge.exe 84 PID 1848 wrote to memory of 60 1848 msedge.exe 85 PID 1848 wrote to memory of 60 1848 msedge.exe 85 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86 PID 1848 wrote to memory of 3576 1848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1265468121448185966/1265472444492283995/WallbangPakMaker.exe?ex=66acd74e&is=66ab85ce&hm=6f333cf6f7c08c84a68d7b06ef20fb793c030ed44c24ccd41ff6d683de7e5943&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93de846f8,0x7ff93de84708,0x7ff93de847182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1972,5996274127157109638,9658534285114717124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5506e03d65052f54028056da258af8ae6
SHA1c960e67d09834d528e12e062302a97c26e317d0e
SHA256b26d2695dfe8aed4d0d67d11b46d4542c3c9c8964533404dfe32ce7a3e6cfb98
SHA51215da55267433c41febebbe48983023293c6d436f89a56138cef1cea7deb5cdd7d4bcf58af12835e1152a8ec59e08cfc965e521eb54eed47fe44e1f4c2d1557a4
-
Filesize
152B
MD5a15dea0d79ea8ba114ad8141d7d10563
SHA19b730b2d809d4adef7e8b68660a05ac95b5b8478
SHA2560c4dd77399040b8c38d41b77137861002ef209c79b486f7bbdb57b5834cd8dbf
SHA512810fc1fb12bceae4ca3fad2a277682c2c56f0af91a329048adbeb433715b1f707927274e3e4a4479222f578e8218663533440c71b22c49735a290f907cc0af1f
-
Filesize
6KB
MD5245368f595ecc3ec866ae3d5c9ad52a3
SHA1c5ed7610efbf8f0a63bb6c6d3de2f04344a4f345
SHA256cd80ef51e6ee72d260431147e3aaa91c070880cbb8e26ddac734664ca353b481
SHA512d0bf2bdff32ebb26e9f3383abfe33f584a75267222cdd6ea739972da8a5fc08353364b5885c186c2615b17aded05d98f28899acdc91139aa62ac9ca502f92910
-
Filesize
6KB
MD5d828ec057d00f78b5cee1f370f5c5c08
SHA1885570b355e6b68bfe67ec4445432ee301057697
SHA2569ae06785f126b4f3cbf42287f09e76166ba71b0b558c72bf63c9956aae259f8b
SHA512d3cdc344d74d2edaf36136bcbe7b303dcf90705fb6f9bc77624b6b08417ea5acf929ff5191943bbfd0e2b00b3acf9f2fa1b1f4072df01cd8f339ec879bccd201
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5541fc76c01a29aee11dba285833379ca
SHA17f632077bb10cb2adc68b2548aba0eafe47793e3
SHA25611a0000c6505075911bdd5163bdee2757ff6808c7e0136118cf8f435e325dcd7
SHA512141225ca775f8702bb508aae779584b8d40e6b1a2ac2648d462881dcab64a326be457a143e2dc19b1fe1852778612bbadcd6351e5d5d823a839ad87ee97aa782
-
Filesize
1.8MB
MD5de4cd70b80a23bf7e8a8c1673ff75e60
SHA158db496965aba77917007470779b0e216528f632
SHA256be9d1b8621fbe13d3db00e0a3fdce8227ca0410c596e580866c0167c421b83bb
SHA5125d802f07a2b3855c362dcb6046ba8bad1f0b51fe022cd6bf108fbc675e0cf17275f1650ef5c0bcfa0aed86795872ea79f639a2eb81523601b9a37357bee08b6d