Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
Honeywell_2023.3_M-0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Honeywell_2023.3_M-0.exe
Resource
win10v2004-20240802-en
General
-
Target
Honeywell_2023.3_M-0.exe
-
Size
46.2MB
-
MD5
3802a5b33067a06ccb33a613070479fd
-
SHA1
98b728d169d7dd3d59b8ce2f2d6d11265dd9d1cf
-
SHA256
5ef5935b0a5603fdd6a8c3eaf48bcafee4b7e63449b098595241c08a851677ac
-
SHA512
c3216a15a637f75d95a9321f443fcf972a3e99ab48e4c43e54b8e9e7b983dcc988ee6dbdc2d1289812b7ca3455d78a41f48eec273dffcef645bdb2688f1b4953
-
SSDEEP
786432:5aAtof5Kv9YAcOOHibpUuaGrTGr4NOwkrET5aObmo1bSjNZIV3UGb3OXEJh:CKeVOwiWHeTQ/65afNZIV3U43Oc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 636 __ExtractWizard.exe -
Loads dropped DLL 1 IoCs
pid Process 636 __ExtractWizard.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Honeywell_2023.3_M-0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language __ExtractWizard.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 4316 msedge.exe 4316 msedge.exe 3164 identity_helper.exe 3164 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 636 4784 Honeywell_2023.3_M-0.exe 83 PID 4784 wrote to memory of 636 4784 Honeywell_2023.3_M-0.exe 83 PID 4784 wrote to memory of 636 4784 Honeywell_2023.3_M-0.exe 83 PID 4784 wrote to memory of 4316 4784 Honeywell_2023.3_M-0.exe 87 PID 4784 wrote to memory of 4316 4784 Honeywell_2023.3_M-0.exe 87 PID 4316 wrote to memory of 4300 4316 msedge.exe 88 PID 4316 wrote to memory of 4300 4316 msedge.exe 88 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 1732 4316 msedge.exe 89 PID 4316 wrote to memory of 3704 4316 msedge.exe 90 PID 4316 wrote to memory of 3704 4316 msedge.exe 90 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91 PID 4316 wrote to memory of 704 4316 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe"C:\Users\Admin\AppData\Local\Temp\Honeywell_2023.3_M-0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\DP_8C52.tmp\__ExtractWizard.exe__ExtractWizard.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Honeywell\InterDriver\Installation_Instructions.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d47183⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:83⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:13⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:13⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9517440120255877393,9524208291072321242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:13⤵PID:1912
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD503cf8b630ab78d2379fa5b618da1d8ee
SHA190e01e7a006e739fae03c4db8f3144604cf301a8
SHA25675088216f59fc966ae98104dad4c95c6b2c8966a7ad93ec9e112db065a19b00d
SHA5124094a89d6ba8b35745e3acfa20e4a2e118deb284469681e2f6f3d1ae0129491225f5876585f2d2c4984185a9aa52b08369d7ad0977507ba6bf9565e214aab190
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
6KB
MD5654bd1b265b7957254c700d6de287503
SHA1616b2b1964270f67c5443b15ff7ee3a1cb275a40
SHA2565b2e4bae8669134921aa9090e3c41884e59986766ecfdc38223e60470a34dc5f
SHA5129156170e49fb40e0b05aef76386c5481eb0dc494bf456eb64e0700c3ff583597b6ab9ecaae6a8dc0ff639d4b67a8051a2659650fd717e5678a7317337dc98e08
-
Filesize
6KB
MD519eebabd31e5a425b38bafe9ba5ca0ce
SHA1cf1224cd6cfc0b393dc25fcdf8320a740f41a223
SHA256663f63d7a1f57fe31864b30d427cfd42f352ee92df82a0179997a0f13c3d1af3
SHA51266ff3b8657265ff3598a049f4bc04d492c62afba197eea67e1be0143cf0a614c2fc58454781ee3a85de71f45bdeb457c63cc05210641ca051d66c3ae15b30a2f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52344dac76e2e41d231b8cf57552e3524
SHA1a9a30e853db0b09370ce2c856f4b528bde373e18
SHA25699316f4493a396bc420455618445ed59e879e1c52194563680fed3492ef494ca
SHA5121aff46f2d202cae555c318a566aa1f603b9ef1beef07bdd1d91c487d0caebdaf7d13764677c75208ff10d37c9b177b9bfca294665db1a18ef9c86e1da56a4a66
-
Filesize
411KB
MD5c45b7e9b6e71f81b67f1077fc3089d5a
SHA16c3fa97500fe67629365699838e29a152523d6f1
SHA2567fb3050259675d734d1b18b88c767216250d2b80dfef328edb62b53250187626
SHA51236fa9fb22b78584ee06a9e89f6e1210999c6df76b8b81efa78cbd4b66a9b07fef938d2b551f3ebbdd209252d01d4f69f34ed9ae20aa6d7323f67996fe1ae748d
-
Filesize
249B
MD53820c0389a15aff50ae83d12b11075db
SHA1f1c2a6b52f33ceb6916d2c1ee2c9ead427c0ddb1
SHA25608ff6c2957e281894bd560bae92aa6f73cd93a05a886d78d0b8c663d657fc3d3
SHA512f7fda7613c451cf65bbc6bddf941a437cf5d7c6c40c36cfd96f80e6544dca17f3d69ca5ff86785a95b94ee40349d318cf0e348c85c996e75d4e4d7b048a3edc5
-
Filesize
294B
MD51e30a78ca8feaa3a10db3c663e252bed
SHA1d5ab5ed45044576f3aa34c0c3e8b6af4950664eb
SHA25604755f553bfb7b5d8bb9f0c4f96bbb671ad75f9f9ea72dfb33ec0a517024ed77
SHA512360cb78923820c6631258c58a6733f505f66fe84eb66eb007ced0b15366910f93a173db72281ae537019a4a421908ea81cc8f04b77d0f529043603ca40d7a9c5
-
Filesize
37KB
MD590586eb1e95bd78e2f9d13c7e7a05240
SHA19c76d2c2ca25e22ebe30ecebc1ed8ca3d7fd21ba
SHA256f7c7851704068db0b32f712af8202402a5324971d36833fdc714cabf8313bf07
SHA5129d49b3c3ba8ad5136a20e37215d0645c5144dc60924ebd6ca74ef726fa099796c83bf8a4a08d39446c8abff5e6394945f873aad3beaea47599de9aeb09763f45
-
Filesize
195KB
MD5ab901db197657111ff3d6dba3f9418ee
SHA180904b82e4d37d2c0a622adfd6c06f3e72bb0842
SHA256c428096e255882ba1823a2939f48b86938865981a8b4dc5a05f56cbb9baf0bbe
SHA51236b1a555d541222898b6c8f1e794d582bf4522bc3453647cee1ef7c0c160c2809069245cee3241e6008746be092aa68b3689f8bfff6580e3467e60f88fc75f06