Resubmissions
11-08-2024 18:50
240811-xg9eaasfln 811-08-2024 18:41
240811-xb31bawgma 811-08-2024 18:41
240811-xbw7rsscqp 111-08-2024 18:38
240811-w93xjasbrn 311-08-2024 18:17
240811-ww3plsvhra 611-08-2024 18:16
240811-wwlq4avhpb 111-08-2024 18:15
240811-wv93as1ejl 111-08-2024 17:52
240811-wf7cvszgmp 10Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-08-06 212650.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Screenshot 2024-08-06 212650.png
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
Screenshot 2024-08-06 212650.png
-
Size
302KB
-
MD5
8215cf98ee78db9c15eb03c1d565f6f9
-
SHA1
03020983659e6d6c61631de0bfdec9a965ec5155
-
SHA256
ea717e5576dbd3052c3429470ad4f3bc9bae374d4b9cc7d1c0e68055ec810543
-
SHA512
8e16cdb25bd785bf11608fb983125f71394da0091fa9769ee8504194d0626fca1b66e08245ba6d52af1e498bc16635fcdaedf1dd6b4a77cf9a53d4cd5278a28e
-
SSDEEP
6144:Rl53DXhOKICpEkz40IFGtwyYCzGpvgrUz9iYdwYIsQ1IxxeTMuG:RlxXgKI2xzdqG1ZTrURnuRsdxxe8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3496 msedge.exe 3496 msedge.exe 1524 identity_helper.exe 1524 identity_helper.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1620 3496 msedge.exe 96 PID 3496 wrote to memory of 1620 3496 msedge.exe 96 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3452 3496 msedge.exe 97 PID 3496 wrote to memory of 3268 3496 msedge.exe 98 PID 3496 wrote to memory of 3268 3496 msedge.exe 98 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99 PID 3496 wrote to memory of 2368 3496 msedge.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-08-06 212650.png"1⤵PID:4132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcfad146f8,0x7ffcfad14708,0x7ffcfad147182⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13489938137133446807,14375053965548358466,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD51451c5b07442a2df27b7b567f13cd11e
SHA19c93a338095d834d0c45fcf15792787de0bef0c8
SHA25612b0cf03e3816827dc75666ccf8630d99825fb8e0af806b8ff436d8ab7d2a0f4
SHA51250acdec71f4d988af083229fb63731c5bf366518165e575a6cb061ac80ed93cc68d764f472eea87e6c33cf5ee5be220c43a553b1f5ccc32f37801c11c5a28653
-
Filesize
6KB
MD59f0a14e123c722c5420f9fdac5690b43
SHA103370504e1f5b215bc2e296c29d9264c24154b2a
SHA256f295eca151ffd37d68f6350a661bc453f5d863fad99bce372d0d00ed6e3e0a87
SHA5125f0d7baaa45ad4c0bb045051b26f503f6a46199615ea7b0d988d5bcc567aea0f17bd3d7322b0bfa746aa19b6b970ccb83b5b6e1957bea1609fd130d93a5de9ad
-
Filesize
6KB
MD54a029251c6265d2380dbc33e74c1f219
SHA1338b636227d0ec26b40e06f1a1fbde4283ac8dac
SHA256f78c4dcae8d716c1254e610a8db7194ccc3a727c1e7650047e342ee4a991a7ff
SHA5128b0a17b3f34a953395867e0a1444dacb1d0a8a93d2ff4212b9059582d272d4173c3266756cee6a6208680a5c4cc2a7d3fcc9a1b090f17a05d04666676d9cf1bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5681a2314124f483a931bafb686312300
SHA13c8e827b1fd6d68ff64884c2aadb2553f6fc2dec
SHA256b266a5a278e98f73bc424091caafb90d609ddb50fa9df1ed7fde275cdd55552d
SHA5124fca778949782b962f865028d55ad28a2796608d049dd6759ad490bc050f7d7f2d0509d9496450273a2fb8a8e9ac38b96aeeb9a316580d6ffce3a6beea39bb17
-
Filesize
11KB
MD5a24385943847798946011b19b5ac9152
SHA1a727cb5c96d5e8f3f971ad0912eafcbfb0f1dafa
SHA2563f1c2c36e4deedb5b798aa32e4d9eaa202f571743c5706357ab992b4f2fc2575
SHA512f3976faef4b8320be184504126e8afa6b6df641ac75200d962779321cbaab5f538c807d7122c253ff3219fee46c51b489482bc0e1175a938d5c3ded056da0779
-
Filesize
11KB
MD5f9f1117f0bdf31256d829aab7c550a0d
SHA111812ad6768b5bfae1e264cd3bd69448a9e00a3c
SHA2562b65511f7890811cc6aaf29ccb4a77dd19dd664f29ebf20c55887d318e894dc7
SHA5125b6a0f1da675b814d439abdb53c78684415e8347428541277a8c4845c3c004244e68eaf034383efd9ea3053ddce2d103067efab1b609eaafb650b28fe42828ca