Analysis

  • max time kernel
    87s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/08/2024, 13:31

General

  • Target

    mineways/for_old_machines_Mineways32.exe

  • Size

    3.7MB

  • MD5

    61cf9ff5cf455be100acb5a01f2cd354

  • SHA1

    93a7538aa65b88e327cd5e23173821daa3555301

  • SHA256

    e46a403ab0c0644ae081e8a77ecfcbb31e46d2027548c5f37cd0389d1baf809e

  • SHA512

    649d0e7f0e6ffa4be33f4100f396b1a10525eaebf4da74711841b92ac08e8e202f92004b63392bfc7ae67c7bb16a7c1498d165cc4ae412ccc8d9b47f4d0c1e53

  • SSDEEP

    49152:jXUM9dH2g7fhV7aeSNIjlHUEuPa00ffE6fT6aPguGGu9TJ/H7aZ:oM94afhVmH6iEuPEffEHwGGu

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mineways\for_old_machines_Mineways32.exe
    "C:\Users\Admin\AppData\Local\Temp\mineways\for_old_machines_Mineways32.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mineways.com/textures.html#dl
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf2883cb8,0x7ffcf2883cc8,0x7ffcf2883cd8
        3⤵
          PID:4172
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:2
          3⤵
            PID:1776
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:444
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:8
            3⤵
              PID:4632
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
              3⤵
                PID:564
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                3⤵
                  PID:5068
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                  3⤵
                    PID:2088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4844
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:1
                    3⤵
                      PID:2860
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:1
                      3⤵
                        PID:4456
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:2844
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1412

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              b4ae6009e2df12ce252d03722e8f4288

                              SHA1

                              44de96f65d69cbae416767040f887f68f8035928

                              SHA256

                              7778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d

                              SHA512

                              bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              4bf4b59c3deb1688a480f8e56aab059d

                              SHA1

                              612c83e7027b3bfb0e9d2c9efad43c5318e731bb

                              SHA256

                              867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82

                              SHA512

                              2ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              bb30c3e561e9edf203caa82e516cfff7

                              SHA1

                              eaa845c3e0ba2d0e03db06546eb27575c7c92d56

                              SHA256

                              68baf0c9a387d7c3c43e76f206d94e6d7d42077bda65f52e8b66b44032467cec

                              SHA512

                              af8f81f1f9070f4b8e2f43b3b9f80e51be65d2e61510836b7bbb7bbca8b5590fef67750ba6ee34a59f5c6a7f8aaf4773a3f2325641bf7719c687358fcbe9d1cc

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              fced22484751dbce050796f97533f215

                              SHA1

                              26fe76a05ff642aaa59d28e95bcf49d67a322f4a

                              SHA256

                              25dfcca9f353d8f40901c51fa8cee067ace46ad449e0269660d3eca2cf2f2f16

                              SHA512

                              c53176c5baa904cdaff2bed4ad801f52a9932236e82a035c5d0277561730e66f6a340bccb60a07bf09ff185ffbe508e12efb6146821a8ee8de86ca4d62bee245

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              708a52115097e223e13e851667b17b0c

                              SHA1

                              498f317c853fbecd3eb939e88e6406019424fd62

                              SHA256

                              092066894e78783f2f694d489fdac832c9f64f8c8860f1ea6b412e207b37af26

                              SHA512

                              c0e8d562c16ab3035e3b022b7726918f5c17ba5341ac6d1c1faa16506c6e4bb5b21e8b848d30aa01f87c76706bc977091202166f984eccadcdf576018c216d87

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fead70c5-b04b-43f6-bb87-1494300c8ae4.tmp

                              Filesize

                              6KB

                              MD5

                              1ef68596ea42c3959174fbe18bfb97d6

                              SHA1

                              66394d5dc086fa3ebbfa2b91b34c7856153776c1

                              SHA256

                              1ce0a81aa33d9f0d499cc97b23fd07e3b3b57f93ff3eda9134a62755d9614505

                              SHA512

                              f12e50c03defb2699dfb33b594d2f77536d77c02ad5a4095e412e3516ecab057b11cec75582a24ba82e49900df130732ef27db3bdec472b17a2928c68ef2010c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              5aeb8e9725d79cafc85f01c0e53e1c6e

                              SHA1

                              8e65d93bd10ddd481bafea6a9e9295e7dc02e26c

                              SHA256

                              0b4691e4dbbba7b19404dca186168d3b3e11db86bbba7f26b17f4da0e0c3bcc3

                              SHA512

                              53b4b30a82646d383cc9bd1c42cebc00cd37e391006e4193b808f6a7f061e711596c27083e970a76e62985f9d88f9d012ef44f6515d46bba1755a429e45a7e9c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              0cd05fd0b8734aabf308517e173a6a81

                              SHA1

                              01863a6c317b6740ad5ba74502e58325a55f67ad

                              SHA256

                              6eaabcca3566e6f5b732393f1b4df5c556d16379d42ec3548044bddd2e4c6d5b

                              SHA512

                              4bf13d664b7b48c01c3b79ea3fca4e67b773ec38f22af7ee183d1be51e5210cc6df5b2ee85c6c60cfcbd2a98f778ebe7a703cea9e747e38ade794d4dbbe4a405