Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-09-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
crackme.exe
Resource
win11-20240802-en
General
-
Target
crackme.exe
-
Size
112KB
-
MD5
c4b4e2fbc5f07212756d52df2d75c2a6
-
SHA1
0a08db431178a36cacaf60a0ed045f1b09d66b01
-
SHA256
7b105bd27940d73890173e6cbc182bd0d7e34c1e8e656c0483cbdd90b9c1be9b
-
SHA512
4ddec2b368bd5a9e786b47a8edc188f7fd40ace61eb101158c0be21e5ac5603a0fe10f3ec4f6f74200246a1decc5c072de1e05e53f0f977e2260d51d0e66f6e2
-
SSDEEP
768:Sv1nVQ2TbhV8CbBcjxoVMQ/X6V2slMBkp4BZqX2Ox5HBw7:kjpbYzOVz/XQ2sqBkWLnOU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-131918955-2378418313-883382443-1000\{459BF9DF-9AE0-48B8-A2DB-B8D325DB842E} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3572 msedge.exe 3572 msedge.exe 4960 identity_helper.exe 4960 identity_helper.exe 2600 msedge.exe 2600 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4108 3532 msedge.exe 85 PID 3532 wrote to memory of 4108 3532 msedge.exe 85 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3468 3532 msedge.exe 86 PID 3532 wrote to memory of 3572 3532 msedge.exe 87 PID 3532 wrote to memory of 3572 3532 msedge.exe 87 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88 PID 3532 wrote to memory of 5084 3532 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\crackme.exe"C:\Users\Admin\AppData\Local\Temp\crackme.exe"1⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa4fd93cb8,0x7ffa4fd93cc8,0x7ffa4fd93cd82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1896987241545829685,14946786634093580120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e681bda746d695b173a54033103efa8
SHA1ae07be487e65914bb068174b99660fb8deb11a1d
SHA256fee5f7377e5ca213c1d8d7827b788723d0dd2538e7ce3f35581fc613fde834c2
SHA5120f4381c769d4ae18ff3ac93fd97e8d879043b8ec825611db27f08bd44c08babc1710672c3f93435a61e40db1ccbf5b74c6363aaaf5f4a7fc95a6a7786d1aced8
-
Filesize
152B
MD59f081a02d8bbd5d800828ed8c769f5d9
SHA1978d807096b7e7a4962a001b7bba6b2e77ce419a
SHA256a7645e1b16115e9afec86efa139d35d5fecc6c5c7c59174c9901b4213b1fae0e
SHA5127f3045f276f5bd8d3c65a23592419c3b98f1311c214c8e54a4dfe09122a08afb08ab7967b49bd413bc748ce6363658640bc87958d5e0a78974680a8f9beadf44
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD577e72c1e40d755d2d40033e1c0b0f275
SHA1e32a5742a7133459e3fa14dda078284028cd3b2d
SHA256679d62786be6384b5b22247b4f3c799166c6b4632649f6f989fbfc8f14622cf0
SHA51295e86d1221400b24d6c11712e15f9606afabee12c6b1079f595649e31ea629a1c20d48c3ba217b24b819b41cc0e725b1624ebe7540fd8c121d7ed7ebcf653753
-
Filesize
6KB
MD5f4fae4277bf54211bd9e90979084bd51
SHA12f84b9763f314ce9f79f92f955308b2a6ea03563
SHA256174797c5355902abfdfa3c0760122c83cdeda07243bca511f2a74f5b41cbc643
SHA5125362d7f06162c364c578a5d232f25e631923658b9db664a0b39f2ca5ea0546c94ea0a29be6fe041aec2c2d2f9117644ceb60b368de2bcc22a4ca8a88417e9ecd
-
Filesize
5KB
MD50435539b0a58514c0d76f675bd716ff8
SHA180bf46875f6ee8cc2f907ee21f41dfa9e98430bc
SHA256cca22ebbf6172ff312d56dedb1822e3fafae53d816baffe5b8cedc21b5b13ba3
SHA51245105b4f4d5dad14680957d58761d37a41186b19c47d39f86314697a0574f105a39655bcc1b80279540d8d68b3584db32687eabb7883cf403d015b9d63290690
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5fccbed6deb566654beca2ced7c398367
SHA183a533c9654611cd432993884aa638715909670d
SHA256ab3b8db358f2d3fb26a813ad7d9312a0283118c37f4f76f8322a9b1cf28f96a5
SHA512e5bdb13ec409e00a10b751f8dfb487a37dd2086fdf1f8ceea66398c5e859977c7bd951272bfcd2fc1bacfd8e5a9243df5b9504c5212316d3346df4577152bc69