Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe
Resource
win10v2004-20240802-en
General
-
Target
633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe
-
Size
3.8MB
-
MD5
a6626b71acfb1b02c3701ff6d9488150
-
SHA1
470c0846b790506728c9dc4c5616e3cc79e7103d
-
SHA256
633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5
-
SHA512
60d5ca672277bf55a648059fd6bdf75fd4c5f29b19795befc7ff7495dac1bdf0694b04c36c4adbdc1190b7bef9cf7734da803599829c890f035ab6a8bac8e735
-
SSDEEP
49152:1fs6Ds61AsNHyva6SRw62VBzCGPJ+kOWIFa2XWI1q+GUWI1q+GdWIbqqDpWIba2s:FswsUHysR+VB2GPJ+k6R+VB2GPJM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 msng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: msng.exe File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\msng.exe 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe File opened for modification C:\Windows\SysWOW64\msng.exe 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe File created C:\Windows\SysWOW64\rundII32.exe 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe File created C:\Windows\SysWOW64\rundll32.exe 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e003100000000001159aebd100054656d7000003a0009000400efbe025989631159aebd2e0000008fe10100000001000000000000000000000000000000d38dd200540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000000259906d100041646d696e003c0009000400efbe025989631159aebd2e00000070e101000000010000000000000000000000000000003b5adb00410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000000259896312004170704461746100400009000400efbe025989631159aebd2e0000007be10100000001000000000000000000000000000000a6e73b004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = ca003100000000001159aebd10003633334131427e310000b20009000400efbe1159aebd1159aebd2e00000025340200000008000000000000000000000000000000d38dd2003600330033006100310062006200660034006200310033006200650063003300620035003400620033006500380033003800620031003400620037003500630064003200620039003700380062006600340034006400630030003800350036003700360033003700640033006400300038003100650032003700340065003500000018000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000025989631100557365727300640009000400efbe874f77481159aebd2e000000c70500000000010000000000000000003a000000000003364a0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000000259b96510004c6f63616c003c0009000400efbe025989631159aebd2e0000008ee10100000001000000000000000000000000000000b73236004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 msng.exe 2648 msng.exe 4872 msedge.exe 4872 msedge.exe 808 msedge.exe 808 msedge.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 1308 identity_helper.exe 1308 identity_helper.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe 2648 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 msng.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 2648 msng.exe 3548 explorer.exe 3548 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2856 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 87 PID 5068 wrote to memory of 2856 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 87 PID 5068 wrote to memory of 2856 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 87 PID 5068 wrote to memory of 2648 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 88 PID 5068 wrote to memory of 2648 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 88 PID 5068 wrote to memory of 2648 5068 633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe 88 PID 2648 wrote to memory of 1976 2648 msng.exe 90 PID 2648 wrote to memory of 1976 2648 msng.exe 90 PID 2648 wrote to memory of 1976 2648 msng.exe 90 PID 3044 wrote to memory of 808 3044 explorer.exe 92 PID 3044 wrote to memory of 808 3044 explorer.exe 92 PID 808 wrote to memory of 1560 808 msedge.exe 94 PID 808 wrote to memory of 1560 808 msedge.exe 94 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 3812 808 msedge.exe 95 PID 808 wrote to memory of 4872 808 msedge.exe 96 PID 808 wrote to memory of 4872 808 msedge.exe 96 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97 PID 808 wrote to memory of 3476 808 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe"C:\Users\Admin\AppData\Local\Temp\633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e52⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3548
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openclose.ir/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab08946f8,0x7ffab0894708,0x7ffab08947183⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:13⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:83⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:13⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:13⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:13⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1284 /prefetch:13⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:13⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5882213423094549236,1988645036717001654,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:23⤵PID:2720
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
5KB
MD531a9e8e71f4d11692f0513f242d445bf
SHA14b7dfa92962801a13137e99fec0c8b360ae645e1
SHA256add3f3c698133a125099e18c7b5f060a9b0e820bfb61703d4ae2113d01857476
SHA5121ea2719d83518f5eecff69559e51359db0f944794fe966604712b2013d6baf041b62f31cd528d9ac2bba1619c2b44497606135fad8868c4a99e315be694fb25d
-
Filesize
6KB
MD5223aa2f847fe931eec943ed50a2a17b9
SHA1f60e0a5b7f74e8dd127b37ede0b40cd4473bd4c6
SHA256e45ad41ac13015d223c5e9e61bc04b84d1329e3fe0baddccc0e23b0ce020035f
SHA5124b40a832d5c75dfde96af29d1b2fe8112ce0b94cecd1032faa34af258b3b69ae81711ac635a410776c3768268993f4518de0c3c119bfa54060b4aa3effc4984f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD512448930895a5abdd399004e99367986
SHA1098016897a49f427dd4ab94231da931318df0a40
SHA256d2c370156e58e98a74f55f4786d1d9202dfd1afa05aaa9d24a3082e21b332f1a
SHA51277e9674b402203b386126e0aa486b3a147601121cb5a677b8d0c78daaf0016b6afeb7bbe47266320f7323bddd9848f88c1ecdb977b9607437dce5b550d289ce1
-
Filesize
3.8MB
MD5a6626b71acfb1b02c3701ff6d9488150
SHA1470c0846b790506728c9dc4c5616e3cc79e7103d
SHA256633a1bbf4b13bec3b54b3e838b14b75cd2b978bf44dc08567637d3d081e274e5
SHA51260d5ca672277bf55a648059fd6bdf75fd4c5f29b19795befc7ff7495dac1bdf0694b04c36c4adbdc1190b7bef9cf7734da803599829c890f035ab6a8bac8e735
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
100B
MD5e53f1a809fb6ae99b7620b7aa15d6ea6
SHA14424f8e6667ab0101a6ff5e2ff5c7243101b64f4
SHA25628a6e26ff1f6ea51e8f382bb2c9dc3982f1b56ea67f448e6d160979726481c8b
SHA5125ccf8e9074ca893e8e38adb4670afc88cbb720f9b9a3dc1ab4777e7fb4eedb2f6559d68ee9d8d47a692f2ecb42ea67139773649b24c54a4d62e50fee164d7974