Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 03:59

General

  • Target

    e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f.exe

  • Size

    3.6MB

  • MD5

    7c3b6a7c2de1cc8c037818a6c2dc3ce2

  • SHA1

    2a32e017d73cc9af9ae56ac5d68deeb684b8429e

  • SHA256

    e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f

  • SHA512

    bf19b68384a4cea0693412d7dfded2dc9cdb15e1632f538a8c83cc7f4a6b54b29fbeacd01162d9dda0243d6872477a90278a9e6beadf97bd397c9d4318134132

  • SSDEEP

    768:m/raHM782f9rvs2Zg5nicskQzTGfxgzh3emu4v/eB4z7VP7LdGSu2HyTAzfMgTAM:m/roM7ZJfUQWgY54vqy

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f.exe
    "C:\Users\Admin\AppData\Local\Temp\e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2112
    • C:\Windows\SysWOW64\msng.exe
      "C:\Windows\system32\msng.exe" fuckystart
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe http://www.OpenClose.ir
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3048
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2928
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openclose.ir/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9dc1146f8,0x7ff9dc114708,0x7ff9dc114718
        3⤵
          PID:2404
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
          3⤵
            PID:4576
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3300
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
            3⤵
              PID:1856
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
              3⤵
                PID:2984
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                3⤵
                  PID:2416
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                  3⤵
                    PID:4408
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                    3⤵
                      PID:8
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 /prefetch:8
                      3⤵
                        PID:3084
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1276
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                        3⤵
                          PID:3088
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:1
                          3⤵
                            PID:2152
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:1
                            3⤵
                              PID:1556
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:1
                              3⤵
                                PID:3936
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1876 /prefetch:1
                                3⤵
                                  PID:5720
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1076 /prefetch:1
                                  3⤵
                                    PID:3560
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17327125782397528727,4851648994674360033,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4320 /prefetch:2
                                    3⤵
                                      PID:5464
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1640
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1900

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      f426165d1e5f7df1b7a3758c306cd4ae

                                      SHA1

                                      59ef728fbbb5c4197600f61daec48556fec651c1

                                      SHA256

                                      b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                      SHA512

                                      8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      84198228df3c6e3b6ef9c29de7462a83

                                      SHA1

                                      d9bd229649a04fdb732ec779c01afa22d6977b7b

                                      SHA256

                                      8e4ecceb9426c6307e22aef4fd7d8a6a11778c8d5ecef0b454b8db5445486c59

                                      SHA512

                                      898362cb8e6b9af55b48135b35bee14bfbd1040dfd0137c2f0ee4b4733cd8aabc7e155018e510c24cbb3b7c0d3726ea502456c257df6d3b1a1a2e9ff2021e58d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      d358820cb659ce22cba55add0ea2b7cd

                                      SHA1

                                      08332697489dfc86644e553852bd6ab897295e36

                                      SHA256

                                      37d6a8cd0ddba93c8bc7a0401f7b48e6cd54b96c8d3d9a066123c370467c56b4

                                      SHA512

                                      241587f33e603a6a285bba6f2617b9601fa11ff13886d468dc9555bf2eb252f490be0b79079764888b43892585ef37da323d5658547c29d1b771bf3246d17497

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      fe196f72e2eee494cf0a8f58c889928d

                                      SHA1

                                      ae902df24cdb9d1829e2982bc34f51e1e27bb4f2

                                      SHA256

                                      ed43c5837560cb17eb80c8e973e891ccfb120fe4d105f55847d032bd980a03c1

                                      SHA512

                                      7994ab743c7023e84647df9c71fab136712a814911b99e7e1415501f217661c5fd2ff109c8456ad13a6fe3808688f603fa3774a6e1268fca21d3b29455fae4e7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      e459845e58b86e49c804dbaffa6ea071

                                      SHA1

                                      9bb7166cf4105a6c2c88f5b4655cac1ac7973ec0

                                      SHA256

                                      dc9db2f2ab70b4b6b7b360f91aafda4647097203249310dc0f80c317e653cbaa

                                      SHA512

                                      fe43dde316bda9fab6763a3b4d69a39b83e314a2d502b62aeb04b19e7a434fa21d4ddaca5ab84b0056c4af4e19f667661b1ab33572c826cb264b60fc550610fe

                                    • C:\Windows\SysWOW64\msng.exe

                                      Filesize

                                      3.6MB

                                      MD5

                                      7c3b6a7c2de1cc8c037818a6c2dc3ce2

                                      SHA1

                                      2a32e017d73cc9af9ae56ac5d68deeb684b8429e

                                      SHA256

                                      e0dda239dd4cf24ec7015ecca493eede2dc7eadf0dc70c7b9501bf756f14300f

                                      SHA512

                                      bf19b68384a4cea0693412d7dfded2dc9cdb15e1632f538a8c83cc7f4a6b54b29fbeacd01162d9dda0243d6872477a90278a9e6beadf97bd397c9d4318134132

                                    • C:\Windows\SysWOW64\rundII32.exe

                                      Filesize

                                      60KB

                                      MD5

                                      889b99c52a60dd49227c5e485a016679

                                      SHA1

                                      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

                                      SHA256

                                      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

                                      SHA512

                                      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

                                    • C:\~0002ftd.tmp

                                      Filesize

                                      100B

                                      MD5

                                      8646e0b8e29e6dfdcaa4de203bb84bb1

                                      SHA1

                                      89504c126afc099f83b177c52cd7c001611f5dfc

                                      SHA256

                                      67a6245b04d28668c423a1f593b8f9005ef7d74731467a546ae19e7801f52940

                                      SHA512

                                      a7100f506477473793b12b68c0419319da7cec94fa924dbbae1c32c6402e9161e37df98409b269d9c993f278327c7f2196150cdf62fe76bfb6f947d5272a4ea5

                                    • memory/1388-0-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/1388-14-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-561-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-258-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-148-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-371-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-149-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-664-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-767-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-878-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-973-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-1066-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-1151-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB

                                    • memory/4696-1352-0x0000000000400000-0x000000000046D000-memory.dmp

                                      Filesize

                                      436KB