Resubmissions

30-12-2024 01:47

241230-b7n1datna1 3

24-12-2024 04:37

241224-e8645a1nhz 8

24-12-2024 04:29

241224-e4ffls1qgq 3

24-12-2024 04:26

241224-e22aas1qgk 3

20-12-2024 12:29

241220-ppb5rawrgp 3

20-12-2024 12:27

241220-pm286awreq 3

20-12-2024 12:22

241220-pkaq5awrap 4

20-12-2024 12:12

241220-pdgk4awqck 6

06-12-2024 20:55

241206-zqhn2axkav 6

Analysis

  • max time kernel
    26s
  • max time network
    31s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-08-2024 22:23

Errors

Reason
Machine shutdown

General

  • Target

    https://cdn.discordapp.com/attachments/1267410065145593918/1267412602447990826/setup.zip?ex=66a8b177&is=66a75ff7&hm=25889dd9dddcffc74a9bfa5301612c6e4360f1a057c5e7506ad1fb4a2463f0c4&

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1267410065145593918/1267412602447990826/setup.zip?ex=66a8b177&is=66a75ff7&hm=25889dd9dddcffc74a9bfa5301612c6e4360f1a057c5e7506ad1fb4a2463f0c4&
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa985c3cb8,0x7ffa985c3cc8,0x7ffa985c3cd8
      2⤵
        PID:1932
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,638459674849333039,15320386843392621464,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:2
        2⤵
          PID:3476
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,638459674849333039,15320386843392621464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:248
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,638459674849333039,15320386843392621464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:8
          2⤵
            PID:4292
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,638459674849333039,15320386843392621464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
            2⤵
              PID:1128
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,638459674849333039,15320386843392621464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:1564
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:4540
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3316
                • C:\Program Files\VideoLAN\VLC\vlc.exe
                  "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnprotectUse.wma"
                  1⤵
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:2008
                • C:\Windows\system32\LogonUI.exe
                  "LogonUI.exe" /flags:0x4 /state0:0xa39e1055 /state1:0x41c64e6d
                  1⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious use of SetWindowsHookEx
                  PID:2040

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  0487ced0fdfd8d7a8e717211fcd7d709

                  SHA1

                  598605311b8ef24b0a2ba2ccfedeecabe7fec901

                  SHA256

                  76693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571

                  SHA512

                  16e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  5578283903c07cc737a43625e2cbb093

                  SHA1

                  f438ad2bef7125e928fcde43082a20457f5df159

                  SHA256

                  7268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2

                  SHA512

                  3b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  475B

                  MD5

                  aedf99a2f43511b1136ef8fb3dd994d4

                  SHA1

                  c4aeb640efe309fde93d84b23467322c4dea37ff

                  SHA256

                  7b4430709a4a034756ca7c88c67beae7bfab9856d0c6cbe87683eb28c5efb8b7

                  SHA512

                  5fb097be09672a256da3acad69082eaf6bdb7cfc279ca694f0ead8229c3f99b1efed2de80abaff160aeb735eb364932cf0ee7596dc5d6e2428f504b9ce1fcd5e

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  27bb5733fbd30703806e0801a77526f4

                  SHA1

                  d0ef80070d27a194ab7343de7a728c7115e762bd

                  SHA256

                  496912418770342f6ac71a55da299a76a92b9e676ce528b661d8d069c89a0bba

                  SHA512

                  a63c7ff7635c87fe15d0833d7e9a6580a8fc10ed13fe2b12727c40204b61bf73ac5503e8adde39407c1172c6a85cd1edce697c3781f907d9737579a4c81e2ba1

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  03cdb2d8de634dfbe9a2274702690326

                  SHA1

                  55083e33af68e9fd809b4933a6e36fa0390ca580

                  SHA256

                  804abf2690c23f8cee2abd612849f9031064a0d59e986d4a4789f76393e98ba5

                  SHA512

                  37b6c74c6eda53e2092144d9dd4592dfb83c5d5ba905fa25c253b22ea239ceeb9a2a6e4b38cd01c1a55bd79568d600813784afcfc6cff00ae4c0eddefca45ffa

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  19681d56432df2563ee7ec23eb71518e

                  SHA1

                  4096224edada04119ed385b02a87a58ccb0b5b2e

                  SHA256

                  cb333ae44b50be2a7df0e873bf0f67c8daf484f5c7863abc6def2273f87d0188

                  SHA512

                  d4107ebcdb1c410f5cadf89067ed8fa846c5ae7da85bb10fc54d4049b33054662e0344ed1b26abe7d44b85ced3c1a616d5ac4cff975ce07dbe83c3dcf9848f50

                • memory/2008-112-0x00007FFA9B6A0000-0x00007FFA9B6D4000-memory.dmp

                  Filesize

                  208KB

                • memory/2008-111-0x00007FF792E50000-0x00007FF792F48000-memory.dmp

                  Filesize

                  992KB

                • memory/2008-113-0x00007FFA94750000-0x00007FFA94A06000-memory.dmp

                  Filesize

                  2.7MB

                • memory/2008-114-0x00007FFA846A0000-0x00007FFA85750000-memory.dmp

                  Filesize

                  16.7MB