Analysis
-
max time kernel
1694s -
max time network
1699s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-09-2024 20:19
Behavioral task
behavioral1
Sample
5d4r8t9u/Defender_Settings.vbs
Resource
win11-20240802-en
General
-
Target
5d4r8t9u/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 3880 msedge.exe 3880 msedge.exe 3476 msedge.exe 3476 msedge.exe 1636 identity_helper.exe 1636 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1172 helppane.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1188 OpenWith.exe 1172 helppane.exe 1172 helppane.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3880 1172 helppane.exe 82 PID 1172 wrote to memory of 3880 1172 helppane.exe 82 PID 3880 wrote to memory of 2576 3880 msedge.exe 83 PID 3880 wrote to memory of 2576 3880 msedge.exe 83 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 4040 3880 msedge.exe 84 PID 3880 wrote to memory of 1836 3880 msedge.exe 85 PID 3880 wrote to memory of 1836 3880 msedge.exe 85 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86 PID 3880 wrote to memory of 3556 3880 msedge.exe 86
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d4r8t9u\Defender_Settings.vbs"1⤵
- Modifies registry class
PID:1436
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1188
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4616
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288842⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff978b3cb8,0x7fff978b3cc8,0x7fff978b3cd83⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:23⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:83⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:13⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:13⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:13⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1812,3886335546696589055,2610776201130361323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50487ced0fdfd8d7a8e717211fcd7d709
SHA1598605311b8ef24b0a2ba2ccfedeecabe7fec901
SHA25676693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571
SHA51216e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993
-
Filesize
152B
MD55578283903c07cc737a43625e2cbb093
SHA1f438ad2bef7125e928fcde43082a20457f5df159
SHA2567268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2
SHA5123b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ec41f4733e1c248fbbbcb7f55df0c6a7
SHA1f13081f2716d135099d73c4ef07470d227fe843d
SHA256acc05d9a94387627acd68dadd46867731f6c5465d4e96b72cfbb193a58772d91
SHA512ff0d5249d58f70b9512a1cae7c4931764b2d1680086debf2bbbb1cc2e331a1680f1cb6d6ec42695fd792db1502bfbcdfe68c7cceded09d8114c868cfae28ce9f
-
Filesize
388B
MD595117196186b4e54890b202d7b41f3e3
SHA104167eed801b9d7a776dd002f0a31b6b90e9629a
SHA25648e61a444f9640388a03eb864e1068ad100afa8552ed3185f05d4598e28c90a4
SHA5120230973eb5db9f99e2b30cd8ff13b4e30ab5c046d855601275f28e756fa45561d0c394e6221a5496ab9242b9ffc0c111760fcda795e550f73100f57389dba82e
-
Filesize
5KB
MD5dbdb8e588d0ab55b73e4e620562960c4
SHA1d5436eb1bc8a72707b66f9781917ecc729b3d1cd
SHA2569a3477954cb11d1bceb698ca0f8ed33c6e9a2fb3cac6e5c7c1a7ecdf14a4e563
SHA512633484659ce23d7e0fba507cdee72f622ecf00f7e3946c90e9f4fd5b031f507ca5f967bad60623378fb091b87ebd90323bf0561e2e34e349fb0eff809f3be279
-
Filesize
6KB
MD50279efbce5bbc09f03eb4001d7078418
SHA1ba1cebe1a2b1f9c4107d6f7dc3903bc9f4531e11
SHA25656a2c78e258ec754027ca81dd0f85e5c813c338913d8a4523192ed8082544089
SHA51236444802ddec8201225f4cb8645e62e14d5b7592eec850bcff9f6cda8ae2edeb47439383481b781de8cd4cd4244e2d1e2f9687b4c02656cfe86e1657c4e45205
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD519a732a547ddca408b135c8dd8ca64fb
SHA1ebb759d68f12e57c37c1378b23c966084d8b1923
SHA2565575be6b99a2285b6f5887c36a4a6184c3439ce63da59bf200464e77c5213bfb
SHA512bd2e58d0839336e64cf8de3a2e2742f11e9baf257f6c4ce16d9e6fd40178c1602f56c96fb99962a8f3adf89b8e513734194a3fe33fc9d695161667e23baeb1a6