Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 15:12

General

  • Target

    Honeywell_2023.3_M-0.exe

  • Size

    46.2MB

  • MD5

    3802a5b33067a06ccb33a613070479fd

  • SHA1

    98b728d169d7dd3d59b8ce2f2d6d11265dd9d1cf

  • SHA256

    5ef5935b0a5603fdd6a8c3eaf48bcafee4b7e63449b098595241c08a851677ac

  • SHA512

    c3216a15a637f75d95a9321f443fcf972a3e99ab48e4c43e54b8e9e7b983dcc988ee6dbdc2d1289812b7ca3455d78a41f48eec273dffcef645bdb2688f1b4953

  • SSDEEP

    786432:5aAtof5Kv9YAcOOHibpUuaGrTGr4NOwkrET5aObmo1bSjNZIV3UGb3OXEJh:CKeVOwiWHeTQ/65afNZIV3U43Oc

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe
    "C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard.exe
      __ExtractWizard.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:636
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Honeywell\InterDriver\Installation_Instructions.html
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d4718
        3⤵
          PID:4300
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
          3⤵
            PID:1732
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3704
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
            3⤵
              PID:704
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              3⤵
                PID:1428
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                3⤵
                  PID:4508
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                  3⤵
                    PID:4916
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3164
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                    3⤵
                      PID:1080
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                      3⤵
                        PID:1240
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                        3⤵
                          PID:2224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:1
                          3⤵
                            PID:1912
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2852
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3620

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Honeywell\InterDriver\Installation_Instructions.html

                            Filesize

                            17KB

                            MD5

                            03cf8b630ab78d2379fa5b618da1d8ee

                            SHA1

                            90e01e7a006e739fae03c4db8f3144604cf301a8

                            SHA256

                            75088216f59fc966ae98104dad4c95c6b2c8966a7ad93ec9e112db065a19b00d

                            SHA512

                            4094a89d6ba8b35745e3acfa20e4a2e118deb284469681e2f6f3d1ae0129491225f5876585f2d2c4984185a9aa52b08369d7ad0977507ba6bf9565e214aab190

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            27304926d60324abe74d7a4b571c35ea

                            SHA1

                            78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

                            SHA256

                            7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

                            SHA512

                            f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            9e3fc58a8fb86c93d19e1500b873ef6f

                            SHA1

                            c6aae5f4e26f5570db5e14bba8d5061867a33b56

                            SHA256

                            828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4

                            SHA512

                            e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            654bd1b265b7957254c700d6de287503

                            SHA1

                            616b2b1964270f67c5443b15ff7ee3a1cb275a40

                            SHA256

                            5b2e4bae8669134921aa9090e3c41884e59986766ecfdc38223e60470a34dc5f

                            SHA512

                            9156170e49fb40e0b05aef76386c5481eb0dc494bf456eb64e0700c3ff583597b6ab9ecaae6a8dc0ff639d4b67a8051a2659650fd717e5678a7317337dc98e08

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            19eebabd31e5a425b38bafe9ba5ca0ce

                            SHA1

                            cf1224cd6cfc0b393dc25fcdf8320a740f41a223

                            SHA256

                            663f63d7a1f57fe31864b30d427cfd42f352ee92df82a0179997a0f13c3d1af3

                            SHA512

                            66ff3b8657265ff3598a049f4bc04d492c62afba197eea67e1be0143cf0a614c2fc58454781ee3a85de71f45bdeb457c63cc05210641ca051d66c3ae15b30a2f

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            6752a1d65b201c13b62ea44016eb221f

                            SHA1

                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                            SHA256

                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                            SHA512

                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            10KB

                            MD5

                            2344dac76e2e41d231b8cf57552e3524

                            SHA1

                            a9a30e853db0b09370ce2c856f4b528bde373e18

                            SHA256

                            99316f4493a396bc420455618445ed59e879e1c52194563680fed3492ef494ca

                            SHA512

                            1aff46f2d202cae555c318a566aa1f603b9ef1beef07bdd1d91c487d0caebdaf7d13764677c75208ff10d37c9b177b9bfca294665db1a18ef9c86e1da56a4a66

                          • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard.exe

                            Filesize

                            411KB

                            MD5

                            c45b7e9b6e71f81b67f1077fc3089d5a

                            SHA1

                            6c3fa97500fe67629365699838e29a152523d6f1

                            SHA256

                            7fb3050259675d734d1b18b88c767216250d2b80dfef328edb62b53250187626

                            SHA512

                            36fa9fb22b78584ee06a9e89f6e1210999c6df76b8b81efa78cbd4b66a9b07fef938d2b551f3ebbdd209252d01d4f69f34ed9ae20aa6d7323f67996fe1ae748d

                          • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard.ini

                            Filesize

                            249B

                            MD5

                            3820c0389a15aff50ae83d12b11075db

                            SHA1

                            f1c2a6b52f33ceb6916d2c1ee2c9ead427c0ddb1

                            SHA256

                            08ff6c2957e281894bd560bae92aa6f73cd93a05a886d78d0b8c663d657fc3d3

                            SHA512

                            f7fda7613c451cf65bbc6bddf941a437cf5d7c6c40c36cfd96f80e6544dca17f3d69ca5ff86785a95b94ee40349d318cf0e348c85c996e75d4e4d7b048a3edc5

                          • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard.ini

                            Filesize

                            294B

                            MD5

                            1e30a78ca8feaa3a10db3c663e252bed

                            SHA1

                            d5ab5ed45044576f3aa34c0c3e8b6af4950664eb

                            SHA256

                            04755f553bfb7b5d8bb9f0c4f96bbb671ad75f9f9ea72dfb33ec0a517024ed77

                            SHA512

                            360cb78923820c6631258c58a6733f505f66fe84eb66eb007ced0b15366910f93a173db72281ae537019a4a421908ea81cc8f04b77d0f529043603ca40d7a9c5

                          • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard[enu].dll

                            Filesize

                            37KB

                            MD5

                            90586eb1e95bd78e2f9d13c7e7a05240

                            SHA1

                            9c76d2c2ca25e22ebe30ecebc1ed8ca3d7fd21ba

                            SHA256

                            f7c7851704068db0b32f712af8202402a5324971d36833fdc714cabf8313bf07

                            SHA512

                            9d49b3c3ba8ad5136a20e37215d0645c5144dc60924ebd6ca74ef726fa099796c83bf8a4a08d39446c8abff5e6394945f873aad3beaea47599de9aeb09763f45

                          • C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\licINenu.rtf

                            Filesize

                            195KB

                            MD5

                            ab901db197657111ff3d6dba3f9418ee

                            SHA1

                            80904b82e4d37d2c0a622adfd6c06f3e72bb0842

                            SHA256

                            c428096e255882ba1823a2939f48b86938865981a8b4dc5a05f56cbb9baf0bbe

                            SHA512

                            36b1a555d541222898b6c8f1e794d582bf4522bc3453647cee1ef7c0c160c2809069245cee3241e6008746be092aa68b3689f8bfff6580e3467e60f88fc75f06