Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 02:00
Behavioral task
behavioral1
Sample
stage4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
stage4.exe
Resource
win10v2004-20241007-en
General
-
Target
stage4.exe
-
Size
483KB
-
MD5
de43429789841ca9c3ea968c57a76b4e
-
SHA1
3b88e989e41c91df253865d1c9ab7354009a75d4
-
SHA256
eaff8cd6cccffd5fe64c771a5bdcb21f99697f728ce554e9c594608e58731665
-
SHA512
4b566e4f5a27271a78de5c00ebabc4f4f86da650834c14c18c64656d0cc1a553a68425616a2759791cc91cd86997b968288369b5be108409a322609524aa2dca
-
SSDEEP
12288:5TlrYw1RUh3NFn+N5WfIQIjbs/ZmnzT4:/pRUh3NDfIQIjeZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stage4.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4672 msedge.exe 4672 msedge.exe 2284 identity_helper.exe 2284 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4488 stage4.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4488 stage4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1156 4672 msedge.exe 87 PID 4672 wrote to memory of 1156 4672 msedge.exe 87 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 708 4672 msedge.exe 88 PID 4672 wrote to memory of 4524 4672 msedge.exe 89 PID 4672 wrote to memory of 4524 4672 msedge.exe 89 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90 PID 4672 wrote to memory of 3472 4672 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\stage4.exe"C:\Users\Admin\AppData\Local\Temp\stage4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RedoImport.mht1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6d6a46f8,0x7ffb6d6a4708,0x7ffb6d6a47182⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14131140636439020136,7926574809249989225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5e8b00c430ef7fc01c1f15d6f6ceff8d5
SHA1930f082fcb4fe00ca81494d4482aad5a14352c33
SHA25684298f8662342b4b1f130187b3c1183efba8647069060b79128e4179926ae645
SHA51277a66bbd28e892e2a6b4be95736f4020fba5f88463b188c2197cefde255a82263306f7505f19924d7263558aeb1f64fa01e2a02987f9756530b2fde80acf326a
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
6KB
MD54dec522ab0c874eabf3fc58b3722dec2
SHA118f292b5489f374a8e7b3724c7575d3448f6fa32
SHA256e79b9a262b60b68bbdd04bba1e48b7d102431d7ca2d1650afec1371d56db589c
SHA51203574dd5978e4b5d7548e252d74e179225ea6760c784f21250ad0908782442a206494512db09ea608d116ce56e13a8b63f8bcb389f67d8d44fa905b100a21afa
-
Filesize
6KB
MD5fd0f3f6973caada9e816cb1d7e0fb55f
SHA10260e0fedf46fe66e38bdfcd57c7877cc61c4bfe
SHA256276635d5138f8cff7a95023a5f8c50256b754745bf3989ec6c143b94fce0844c
SHA5124bd4cd349b42e4ce25269d9b84f5bf3a9b44380b7d6dec04716cc748d80a2f03f0fcf4d627d76babaaf37d218c5d94edeefe97d65b6c2ff7f044b60729bb04bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50a4c3669cfae4bc9abf4f29d58e62fd7
SHA1fba29fd5ce486d702cfcbea279f2787ed59da39f
SHA25692a4e1fa04e985e348adbbc6bfbc622ed65af7369de26da44c179b95411792f8
SHA512bcc6a490e65ba2a94e35d6211b030a0cbde281462253fd7406802d2d98b711dde880bb3469eec7f4d64dc1404a41c8a224dd24740f4ac69649820cc257dc353c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58