Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/08/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
CordKiller.bat
Resource
win11-20240802-en
General
-
Target
CordKiller.bat
-
Size
3KB
-
MD5
91732affacbe7d31a8e7a4d99dadd8ac
-
SHA1
f1b10a2ab786530948b6d9d90de862861505e8cc
-
SHA256
4dfdf750ed430ae78a04620a8462275256f3c44f18e8a5f16fbc05cf750e203a
-
SHA512
ac9aef46f266cc23e9f9782fe59399eadd025b4fe359804386629ae5c196641ca28c7cc9165218f218d6decee1f4b5804ff27c8cfa00ed5567262ab110a0acc9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 2012 msedge.exe 2012 msedge.exe 4464 msedge.exe 4464 msedge.exe 3700 identity_helper.exe 3700 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2012 4084 cmd.exe 85 PID 4084 wrote to memory of 2012 4084 cmd.exe 85 PID 2012 wrote to memory of 2428 2012 msedge.exe 88 PID 2012 wrote to memory of 2428 2012 msedge.exe 88 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 3372 2012 msedge.exe 89 PID 2012 wrote to memory of 1652 2012 msedge.exe 90 PID 2012 wrote to memory of 1652 2012 msedge.exe 90 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91 PID 2012 wrote to memory of 1324 2012 msedge.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\CordKiller.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/sipinslowly2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffbacf3cb8,0x7fffbacf3cc8,0x7fffbacf3cd83⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:13⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:13⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14509185488565345238,5992564720768455123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:13⤵PID:4776
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59af507866fb23dace6259791c377531f
SHA15a5914fc48341ac112bfcd71b946fc0b2619f933
SHA2565fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f
SHA512c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7
-
Filesize
152B
MD5b0177afa818e013394b36a04cb111278
SHA1dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5
SHA256ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d
SHA512d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db
-
Filesize
5KB
MD51dffd3641d1360fff32627280cb72a97
SHA1ef192850847b2d06a0ec1be5c10719ea43eb9eab
SHA2566c566378390ce21bb5eb34e37767cec777da6c3aa7c66862b21f138c9cb05c07
SHA512370b1b37f1fc89bb4fe8fa0d5bcf49c6e6ca7c7bdfc175a3ac1f3f9dfc1cbd8cb037b833364695ccd37818d1f4551b12c61b3cf39d116bb28405d1125ea0569f
-
Filesize
6KB
MD5f157e58d55d95df414ef433d1124e391
SHA1f0a583855ede6be79d7da72abf141839916c6093
SHA256c7655cdf12740bd77c7aeb12e547b2585cbaff2b2b345a3db857af9441b992a5
SHA512dbdf9835a69fc74d2ced4afee6902003f3d8a2af8c6a360093547d810cb1c724f60abb02cfc7158d1f86a7a59d744f096c1a619b2952c272ecd86666935e9fdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a656a1708a83ba3f0d6ab194f48e75a7
SHA1ed4442a35b2afae1cca468b73af6767d27acf612
SHA25692792fb5e4cec6636ba51fbcbd4204a10360fb7ad6b52651d66b446090192b0d
SHA512823d759daf2422ef8b292132bce05128e5481d662267bf2823c1a31e2d6673e4e844cb6c33ec32fc1d1e9de19d48df3bad6734e62cbeacae7f13a18436fe5dd3