Analysis
-
max time kernel
104s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 14:56
Behavioral task
behavioral1
Sample
builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
dnlib.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
builder.exe
-
Size
10KB
-
MD5
4f04f0e1ff050abf6f1696be1e8bb039
-
SHA1
bebf3088fff4595bfb53aea6af11741946bbd9ce
-
SHA256
ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
-
SHA512
94713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
SSDEEP
96:IJXYAuB2glBLgyOk3LxdjP2rm549JSTuwUYXzP+B1izXTa/HFpff3LG+tzNt:IJXDk7LI4uwtDPC1ijCHffSs
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
builder.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid Process 1720 msedge.exe 1720 msedge.exe 2080 msedge.exe 2080 msedge.exe 2540 identity_helper.exe 2540 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 2080 wrote to memory of 2716 2080 msedge.exe 100 PID 2080 wrote to memory of 2716 2080 msedge.exe 100 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 3636 2080 msedge.exe 101 PID 2080 wrote to memory of 1720 2080 msedge.exe 102 PID 2080 wrote to memory of 1720 2080 msedge.exe 102 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103 PID 2080 wrote to memory of 3676 2080 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe4bf446f8,0x7ffe4bf44708,0x7ffe4bf447182⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14105034844517250994,17648412536957347756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
5KB
MD5bebef543516070079c1965f51b2afe5d
SHA1492581ff950669e48f345c17bda007607174276b
SHA256b349e524aebe5426b13cba0d3bf5d8c98b11e5138fc7c4ff4cafeef2ddfc48cc
SHA51235f800cb7766dc36aabb107acc242882d66334b499b6e72fe5295705c7337a89995c5f2d730522ef1522ffa8d8f3db09cdf8c4ea97e1d601fe5299b7ebb9bdea
-
Filesize
6KB
MD5f8da9037485798343d55975037ef88c7
SHA16bc980431d7c3f3be52eadd6bad385232290bc49
SHA2568b31c5eb03645440e4eeb5cb50221d1da0016b360293e8d07dbebcb242883158
SHA512e1bce044bc3721c3961f9951f0ba799d87c3aef49296019625a473344d11a1e24a30a0e3262ac204b88927cc6be1f491193fab8da3e7270fdb83b2839e046fe0
-
Filesize
6KB
MD556088d5f0758ec1d6b57ca6da73615a7
SHA1862ef54f544415ecd94caccc184a7c67d519fe54
SHA256b432c2e68ad03e9f4cb79e29e07259b5aff4f3c811049593116235f9defd9f11
SHA512b36ce7e8d5bc9a6ff6cb46412513655d315ed70301da90e9cc019af482beb8e9cfdb991766b80b64b919c309dce35f4aff58bc2544955b589a27b3b9dbff934b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55f5de145a3b91fa6c73b3bacd8b8d652
SHA10267c8696cd48edae8ee6ae098cebb0476f64546
SHA25656417cf8c7bea9ea851b25cc62e5628cc4549acaf6f13fcdaf162a350ec72040
SHA512afd1e4cfc7d41c5bd71eec64e56374ef4893d0415291c86214110bbed66f9754de1f989891bd1fe51328752d95de7eb53f55ef33059cf5c838d5859faef48961
-
Filesize
11KB
MD54ad30f7f6c79827206c568debb22bb3c
SHA1c99233a20c970b129948f5389a714902e4257243
SHA256258c7eb1a8c5892573c5e9ecfc45a287e50fb3ce7240edaaa2a9f893968c17d0
SHA512880bfa2e29a480c74e683e85a723a170471e78cb7d020683130ede95e8f2542a8317f9be40512b0cafd1df061f50bb85a1b711e96183be392d2adf29b7d4ac31
-
Filesize
11KB
MD5167c35947d3a4dc308a9e00557d12821
SHA16e741ac25e5df69e10ec2e0fc3a239d6e50c928c
SHA256e5bc69cee17702cec59e972d64f0f4fc6a86a9d15c3bdf7bd999357b6a9088a8
SHA51229642745558bbb250d4f33bfcd0bc507e05f4951a0a1c57b80a9bf87afbe2c1c961cc8a71c8260361f05fcf43a66fb520c56296fb1d929ae85f79ae4613ba277
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e