Overview
overview
8Static
static
78f36dde1cc...0N.exe
windows7-x64
88f36dde1cc...0N.exe
windows10-2004-x64
8$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/$_85...pp.dll
windows7-x64
3$TEMP/$_85...pp.dll
windows10-2004-x64
3FireFox/bootstrap.js
windows7-x64
3FireFox/bootstrap.js
windows10-2004-x64
3FireFox/co...p.html
windows7-x64
3FireFox/co...p.html
windows10-2004-x64
3FireFox/co...uid.js
windows7-x64
3FireFox/co...uid.js
windows10-2004-x64
3Modules/7z.dll
windows7-x64
3Modules/7z.dll
windows10-2004-x64
3Modules/ArSp.dll
windows7-x64
3Modules/ArSp.dll
windows10-2004-x64
3Modules/BdUdr.dll
windows7-x64
3Modules/BdUdr.dll
windows10-2004-x64
3Modules/BrSp.dll
windows7-x64
3Modules/BrSp.dll
windows10-2004-x64
3Modules/CdPrc.dll
windows7-x64
3Modules/CdPrc.dll
windows10-2004-x64
3Modules/Core.dll
windows7-x64
3Modules/Core.dll
windows10-2004-x64
3Analysis
-
max time kernel
112s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 13:36
Behavioral task
behavioral1
Sample
8f36dde1cc56c41c6bf0da63a023acf0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8f36dde1cc56c41c6bf0da63a023acf0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/$_85_/InstSupp.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$TEMP/$_85_/InstSupp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
FireFox/bootstrap.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
FireFox/bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
FireFox/content/html/popup.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
FireFox/content/html/popup.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
FireFox/content/js/uid.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
FireFox/content/js/uid.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Modules/7z.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Modules/7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Modules/ArSp.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Modules/ArSp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Modules/BdUdr.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Modules/BdUdr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Modules/BrSp.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Modules/BrSp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Modules/CdPrc.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
Modules/CdPrc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Modules/Core.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Modules/Core.dll
Resource
win10v2004-20240802-en
General
-
Target
FireFox/content/html/popup.html
-
Size
734B
-
MD5
c929c4ef17977667affa3fbf2308d429
-
SHA1
8981c4dedbb7446e817e20f206b5c9e174cc0074
-
SHA256
4599c1cb8c97f841d48a003f47e6ab8b7b8f720448129183c4499812468377eb
-
SHA512
1831fb44ec6c9ff32fe21386023d4f0229d85844b09ed28975b65e5aba6eb81c6a0f783a7e023f966cc90082191ea4d5df5c3f803f2764181461433ce38935ad
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 392 msedge.exe 392 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 5064 392 msedge.exe 84 PID 392 wrote to memory of 5064 392 msedge.exe 84 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 540 392 msedge.exe 85 PID 392 wrote to memory of 4648 392 msedge.exe 86 PID 392 wrote to memory of 4648 392 msedge.exe 86 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87 PID 392 wrote to memory of 3840 392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\FireFox\content\html\popup.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9687b46f8,0x7ff9687b4708,0x7ff9687b47182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,2509658664716671689,12859905912275956564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD53299985c3794f0f08b2340bd9d265fc5
SHA17e044dfba9f11dea44566c85ab71fd6101931968
SHA2568a14f437333f14feea3b93490af41425c55eef888554eeffc9fd345ffa417564
SHA5121340cd52aff9e5dbd9ad8b658d1110b41d1436e7831fe266dbdffd8abc87eca3590fba3411cdf1d2e3d27a24169575214cad9a10b627a879176e6df3d104e0f3
-
Filesize
6KB
MD5d7828fe24b2d1ac4c1227f40dc6fd97d
SHA10d143a3c70ea43720f4e4258a9e5d76a80e4ba76
SHA256f91b8ee6d1cc4d70131b66bf538ce5e02ff399e1b448b308ac1415f299aa90db
SHA51263a162ff204a080369e366d3241b149834817e23eaa6ab4228da7a7cbf8f6a1ddb274e007be561775c3483019d98270a224a71c912d7cb63c2be0c4fb81baf37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5402eb55acc711a7d079bd402519439f4
SHA1bfc3bb227c092582aa7518fd92afd6c6c52f03fd
SHA2563d3395a4367e3f2631e641720ee216e326c186291557f6a856756ee22eaa59a6
SHA512a72517a7f819180de067d597d7a01c637d6cd12e2b37ef2ab6c97f55ea8c0ffb5c74f9850691b1c1c9f837ce1cd70505e06cb68353bd592297265affe9c35883