Resubmissions

02/08/2024, 01:09

240802-bh7fes1erb 10

02/08/2024, 01:06

240802-bgdfys1ejc 10

Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240730-en
  • resource tags

    arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/08/2024, 01:09

General

  • Target

    f4143e11689597b0adca400f10ade173a9a547c11423b5ceb8992b8f97ac12fc.exe

  • Size

    328KB

  • MD5

    fc0504f1b146ab86cd582578ac5c1c05

  • SHA1

    0c8fd2d348ac9ed567c28b7f8757ab67bd59aa55

  • SHA256

    f4143e11689597b0adca400f10ade173a9a547c11423b5ceb8992b8f97ac12fc

  • SHA512

    b27b00ec43a2f7cff8211eb25282a9a0f6e84bb58f7344e166fb94c2fa4a45676a0a47c3e428976f04d190d5a50b584c24a9361360a11310f214f3ea14e440ea

  • SSDEEP

    6144:D1UFjS/5wMXuux3py2b9zvnItnUKh2PjIMbM7:6Fu5jXuux3py2lI

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4143e11689597b0adca400f10ade173a9a547c11423b5ceb8992b8f97ac12fc.exe
    "C:\Users\Admin\AppData\Local\Temp\f4143e11689597b0adca400f10ade173a9a547c11423b5ceb8992b8f97ac12fc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=f4143e11689597b0adca400f10ade173a9a547c11423b5ceb8992b8f97ac12fc.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8d0193cb8,0x7ff8d0193cc8,0x7ff8d0193cd8
        3⤵
          PID:4616
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1972 /prefetch:2
          3⤵
            PID:768
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4060
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:8
            3⤵
              PID:4940
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
              3⤵
                PID:720
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
                3⤵
                  PID:3720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,11884336355719218414,2400445947994903170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1
                  3⤵
                    PID:3004
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1896
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:2932

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          3b955e722604701611f125fb68f961ac

                          SHA1

                          cd0229bdf7a707e61b68c076be78554e293be793

                          SHA256

                          cf96dc0a7769526dd103f80138f017ddd6dc6a30d1160e46085a59cab5ced215

                          SHA512

                          7c9ccdfa973bac36d0ff115d1a747762a019b01b3f21d48462e68313efef1aa6cb2f50e40ef211e12b2297d364090227953a7e924ee249a1e5d083e2f72ed53b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          e35616ead296dfc20451e3f2ef0f1a6a

                          SHA1

                          cf5d4de230b9631f31e311ed196483af8d39f70b

                          SHA256

                          79e0d13391c5a17de396de145490cf013b2d21b35bbd02cbedff4f9c069fb0cc

                          SHA512

                          3395980a57ae64d74354c8fb86f6d373ee7ff00fbb6692ce1a0d2f108c3e8ed55e8eefbc986dff90fee28d808fe8ad47428c837a30ce38e6fc70c6743a63a911

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          168B

                          MD5

                          c41ffbaa8541a5560b89b97119f71121

                          SHA1

                          8a81b76e3692595862a1a84bd58dfcf6316901e0

                          SHA256

                          e735086af784a9a1ec78f87bd3c300abdcdcbf5a1a46b42e67d6282470ee0d02

                          SHA512

                          68727d70db6b61e7953de3b1199dafe065595a405a67c71299133a05e06aedbe2c83d2015318b34492386a0e7368ab3bc1f5762715d3e8ec3a0121467a95b6b1

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          437B

                          MD5

                          0a8ea5dae27f141be6436c1a828dc840

                          SHA1

                          d69f06ab302b56ead0af142ad60f5ca8acb4f42b

                          SHA256

                          24c8b87b69cc0aeee6ce898bce60dbdca51dfa690e7e0720b58a87b9a16e52e2

                          SHA512

                          289759ab1f9636c6147526f3419bff7941f77bdc327ba621c5ddbf334afab9723983ff9ce59fb85c3636d63fa402a50becaa9c232c04afc825509652ce2074e0

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          853a77418ff99ecd3bc2067553b7b734

                          SHA1

                          1adad9fd16ea265e0c97aa8a7ab8e8e99a067f8b

                          SHA256

                          b15613fdec6c460aee216c31a60c1cd713468126fe133323dda2364a9062aa01

                          SHA512

                          90f9b5fcf51d916f920559d05d011f02284c086ac9db7a20b1ec8f3e366d5e751deb2ae2b1d0bc5c4bf6ffe667ba127026e64b98fac8eea08e5942c3dfdc7cf7

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          2cd91c55fea1de388097a7a6bed3c018

                          SHA1

                          6b82727f5cecf5bae5c55c98ce8e1f5df0fcb8bd

                          SHA256

                          6ea4668553ce5ccd0c39a05f0ba2fa47df4f10bf0aa63b40f6add74bef44cbe7

                          SHA512

                          7878a986ad69721a0a59058f466b7c0b795f6a72fad4d0d8f59cf426dcc581d8efe54a3340cdfef5bca6b529188e52c1e201d474cab10c3676477179ebf7c996

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          11KB

                          MD5

                          d9d4b52d9dcd20351ee3ede1697355be

                          SHA1

                          6d6fa9b3370c36ec2ac046059c96ab8d0f2c2a6f

                          SHA256

                          f860e10ae3370faf0c1b5c4dc7e3569ff37b83626aebaf42c401f5d1d2cc9d1a

                          SHA512

                          69576adc66eaad041cb2c0ed6389328e7bb5f0b1ec2d551d8973a25e161e8e432209806e45e6a93f1d35b4111a88091a617920a32cb8e848e51445d648b928ad