Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
Kubota_VM#0.5879066031.htm
Resource
win10v2004-20240802-en
General
-
Target
Kubota_VM#0.5879066031.htm
-
Size
6KB
-
MD5
31de19ebbf143480fb4cd1c82090cbfb
-
SHA1
7d1e00b4cf01eda9905e4601031b5052cdb8b286
-
SHA256
3d5e5ac5fdbe71eecfc1c94c4daaf00a42b911adb4f53baade3ec6465986165e
-
SHA512
8bf8c6c220beb0077994b18f26c2bca4e8a75f1c93151006ad21e6663736a3626e1251881753f34f6b53673b3004f0a8a01f17cc1069f80c9347fc85906e4727
-
SSDEEP
96:lJfAj51s6gMbDQq27hWUwitwrNOP2oLcSPK4fYTc:ldAjbldDQq21rtwrNOP5LIc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 1100 msedge.exe 1100 msedge.exe 4764 identity_helper.exe 4764 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4644 1100 msedge.exe 83 PID 1100 wrote to memory of 4644 1100 msedge.exe 83 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 1520 1100 msedge.exe 84 PID 1100 wrote to memory of 2940 1100 msedge.exe 85 PID 1100 wrote to memory of 2940 1100 msedge.exe 85 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86 PID 1100 wrote to memory of 1732 1100 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Kubota_VM#0.5879066031.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974b546f8,0x7ff974b54708,0x7ff974b547182⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6525377866277366850,16209101378965893959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
17KB
MD5952ec9075d757b709ea4469379e28f9f
SHA1c2a96e00b1e7e92ddc80b44e08f4a5c6d693266a
SHA256491a8db58567aef33f3faf9a632059f5fcb915f9ed41dbeef23a9f41eb111f6d
SHA5124a33cc2a4b8dbf0ba294b769c1ad83a1903c1a151bdd691dc54e094594c90f64198b50b1a2270b3ad79e93e94c9856ff24998c79b4cca84a65439f1b2028fed3
-
Filesize
24KB
MD5bfe899d5100d5084b30748cc9d389a4a
SHA16ffecd302fc9a761f01266c234eba171968c2553
SHA256f491e31bbdbad29456d5a8125f1be3bccdae56329c26d79ff63b8c32a99703c1
SHA512d7ac825311abb4967a3eb044c044bf5ebb78f4fc267f9eac92b63825e67d9c903c1abaee4e787f96e26f4d31cff3461e8bd83c2b1fafd9f71ff441cc0febac11
-
Filesize
28KB
MD5b6af1842dee35e7eed8a374d1caf8061
SHA1c45d175f6bebcacae7657bd4e6df91a0e0c0c8f2
SHA256fb7cc62c41b5fc0a2586b876a726051b85fdcca9c35b3930a5d30cd71ae33042
SHA512b823e5d6de872aa4f008ba61a86abe6c8ad3f7d558167b4db9d021e34e6c0a7b8087ba2a58d6bac0fce9f5aca6d8acaf25bc1dff8c06bcbf30534de94f5dfcde
-
Filesize
22KB
MD58fd744af5591f6b66ddca63222c9b5d3
SHA123eb1c3c93b9ff06d5eb1885539b957d12e4c611
SHA256a61a7e71d3ed8b63eebd3d779cc6b80922ab3f8bdc1dd401d7ccb276ba221d16
SHA512de7836f7badaec60f916a4a757df29e4598014b9097ef8ef5b4bfc60fb89ae0ad4c7687f8765cfac8ca2fc4ad8d75a8a69766afccfbdf591ff6ab08086510a58
-
Filesize
24KB
MD59c700e17e974d4ab2dfde82f6451dbbb
SHA1d5b85e82e10c2d96b36316670c76b8a0112bf246
SHA2563ec0462dbcae8561ca0465558845da248d434dc6205cbde99c47ae3be2ac99c0
SHA5121428b7401d281ad3d635eb007e45b6e5798be6b029f270874af2312627c496407ec7440df4a3028f3cd6c1ec587b0805425ae5de4bcb04b90d942145e26966fb
-
Filesize
31KB
MD51e0ba9eeadc5a0f278a6d0cd937c32f4
SHA1309053ac2425519f0c8488903d3071bdadf28b37
SHA256cd0ff7a1ab54f5f8454c7a5dec53fe7f6765d147e9a88bff32eea6a60bcd51ce
SHA512de9e000bbf5b461b157e803ba84a9ddb3dcd5eacd0b75aca533a4345a8035a980e3895f88300da33c46a1086a5aa29dca7b810d2d3017f54432cba1d4cfb33cd
-
Filesize
685B
MD5cf19375f92a0e21f50c143c8f764508d
SHA1993e6299c4253ce7f986e24ece20b6bdddca816b
SHA2562ff433fd3ebca8cc4b12b3963231df49d79ac93628be6b965496ea42148af624
SHA512c47a25858df0ae11294bc69cdd028ee2414e57099875d991dda12852b6b46979e444c656152eb97b4747fbf3f546bbcad6bedc5c37db9c1c380b211706dbf0aa
-
Filesize
6KB
MD5c8c333eca508a750eadb408816f9995d
SHA1521500e3d68a09ee9917fcbb28f4bda0b4e42824
SHA2563c16b821d6697044e0dc29a8286daecebacbebf23fbdb7f3bd5751ee92ed6121
SHA512178e5c96eb9db75590c9c9220ce09d5b738cd2da87bff94bbfe66ab49ad12b253b70805a5fb3fbe305944c65b462cb3de922913f99eb8be172c8541952ff84d2
-
Filesize
6KB
MD5cf0cdfe0f5f2a6e07390d354ea17a34e
SHA131b976247ec3b2570c6cbf55b52ca75d99337518
SHA256707b4985eacce9378be23ba80566a2dd3166307c74c3c061e4b7266331c84f3f
SHA5120edd84cd1546901504efa4453fa7c6e9a08f2e9716f20ff95478924203637dcc9fd7ed6e52ab4da60c2704cb1136dec8c02a3c99fa8329514de6af2224a1d921
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54819700a4d84f6b26065bc426663004c
SHA182bbde77bdd7a435ce9af27dace5638ed5d2ec5d
SHA256701067b4ef54eb83f3e96d03e9aeac31ba1e790eaa606a48e99a1ea7de3a1fa1
SHA5122fbe53109e5599d03df4cd8e480e1bf5e4e46a91baff104a0c544214175b612cb984ed7384658d38023206f8809b36755b990b73192813c13b82789959f07428