Analysis

  • max time kernel
    90s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 13:50

General

  • Target

    https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b9046f8,0x7ffb2b904708,0x7ffb2b904718
      2⤵
        PID:3348
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2
        2⤵
          PID:1464
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2320
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:8
          2⤵
            PID:4936
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
            2⤵
              PID:1916
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
              2⤵
                PID:3224
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:8
                2⤵
                  PID:1908
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2876
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                  2⤵
                    PID:1704
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:1
                    2⤵
                      PID:4884
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                      2⤵
                        PID:4432
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                        2⤵
                          PID:1868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5816 /prefetch:8
                          2⤵
                            PID:2516
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:1
                            2⤵
                              PID:2716
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6264 /prefetch:8
                              2⤵
                                PID:716
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6448 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3144
                              • C:\Users\Admin\Downloads\loader_prod.exe
                                "C:\Users\Admin\Downloads\loader_prod.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Modifies system certificate store
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:2460
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4940
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2744
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:3636
                                  • C:\Users\Admin\Downloads\loader_prod.exe
                                    "C:\Users\Admin\Downloads\loader_prod.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Modifies system certificate store
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1204

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          e4f80e7950cbd3bb11257d2000cb885e

                                          SHA1

                                          10ac643904d539042d8f7aa4a312b13ec2106035

                                          SHA256

                                          1184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124

                                          SHA512

                                          2b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          2dc1a9f2f3f8c3cfe51bb29b078166c5

                                          SHA1

                                          eaf3c3dad3c8dc6f18dc3e055b415da78b704402

                                          SHA256

                                          dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa

                                          SHA512

                                          682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          186B

                                          MD5

                                          094ab275342c45551894b7940ae9ad0d

                                          SHA1

                                          2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                          SHA256

                                          ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                          SHA512

                                          19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a6c036a1c2375efac54066f3e8ef3265

                                          SHA1

                                          2864e736aafd339d0e8664ad16c928db54cae974

                                          SHA256

                                          94623f72f55bc0bb0e3917f3f3554917ee627ba07b90659b93e52a59103a9aef

                                          SHA512

                                          ce823966bf20b4498784bfff06ea398de8751b9060d6cad7a9bc9caed5603f93adec1c8b845c463907fe80a9d9a682c47122ec447cd2951b01269447d0dfc01c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          8e51ae225ccf0d0b63fb843b3921b5ff

                                          SHA1

                                          1700166b721c7dff471b84c65d8949f99de6da28

                                          SHA256

                                          02abf1ac757e3d65e340cdfd67026a3b9f775669bbf0c753a5254b5efcdd8cd1

                                          SHA512

                                          cb85d2bc8f28893ee27927246fc60564cd01a9bc138b704b8ba2e1f8b49ac26e160ebdaa397a5093e22a46d7255183eb7f324251dced97ff1b2c6956bab4934a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          880c85a3797f9fc17cb37354862bd4cb

                                          SHA1

                                          d12e8de9675812e2eb0cc36167b9344c836b4aaa

                                          SHA256

                                          d0a91c608275f93fb8a887c5af8c29ea5f0bc81fcf37ee2cffab1539ad123644

                                          SHA512

                                          d79fbc1f038446081eb059bcea544e1b720ae0700a1bf2c006400b3eec19d89e1a71b5b1184120de98eb3a457feb5710cceb676514955f79bf134294ded3829a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          f49bdfa663bbfae1e232f1fe8f046b02

                                          SHA1

                                          46c62b5cf2659acdaf0d85c209afc461d5bb5461

                                          SHA256

                                          7ed59bd6a14ee5e0bc62387c0e0e3321f59f940b05355376fc14e46eb8d3484b

                                          SHA512

                                          805ebb582003f56ae280de403606ebb673b8350d36b2a0bff1337f0821ff9f2893d77eb2321c0652adb5c71ca59686f0518bdb9d38cf0c48405e722c74da5aa0

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\2BEC128BFC1DC46ECF9336A52D5B1EDB1265FA95

                                          Filesize

                                          984B

                                          MD5

                                          9f2baf0cba9a3b0021d781fdb2ab6ea5

                                          SHA1

                                          42183b94f4946f261fca11d183a96dcd90b90b67

                                          SHA256

                                          e9a5f769a1f3e173a4849dc8d2a5ce89ded9b5ece6c07f42b1b0e8b55d1d2193

                                          SHA512

                                          937a480963026552e67f2a8ac489cce6df22e4467508c20764266faaa93710ad105df4254b1b3e95f81e5b270accb9b462a0b1787223c228337e7586050cfaa7

                                        • C:\Users\Admin\Downloads\Unconfirmed 89954.crdownload

                                          Filesize

                                          26.4MB

                                          MD5

                                          ba41431c69cb3a3a558b7d363ad5160c

                                          SHA1

                                          c981e506dd06d254c456b64fb01de3e5a73ee178

                                          SHA256

                                          ade6b6e09ec807df13e6128b48461ff279967f72bd12cfc777d7114e44b1219c

                                          SHA512

                                          41fccbaa530cfa63ecb1423b79d83fba9f2dbac7f0dd01cbb6653b7e027d1c549830f1d37a923684cfc7ba37644761ad59d11f077250ac0758694252449f4f8e

                                        • memory/1204-264-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1204-215-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1204-216-0x00007FFB39D10000-0x00007FFB39DCE000-memory.dmp

                                          Filesize

                                          760KB

                                        • memory/1204-217-0x00007FFB39800000-0x00007FFB399A1000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/1204-171-0x0000000140000000-0x0000000142EA6000-memory.dmp

                                          Filesize

                                          46.6MB

                                        • memory/2460-132-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-203-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-126-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-135-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-139-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-142-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-123-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-173-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-176-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-192-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-121-0x00007FFB39D10000-0x00007FFB39DCE000-memory.dmp

                                          Filesize

                                          760KB

                                        • memory/2460-129-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-206-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-209-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-212-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-122-0x00007FFB39800000-0x00007FFB399A1000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/2460-120-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-91-0x0000000140000000-0x0000000142EA6000-memory.dmp

                                          Filesize

                                          46.6MB

                                        • memory/2460-261-0x00007FFB3AA10000-0x00007FFB3AC05000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2460-90-0x00007FFB3AC20000-0x00007FFB3AC22000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2460-89-0x00007FFB3AC10000-0x00007FFB3AC12000-memory.dmp

                                          Filesize

                                          8KB