Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe
Resource
win10v2004-20241007-en
General
-
Target
9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe
-
Size
285KB
-
MD5
b94cb0142a49c6a58584781da7a70f2d
-
SHA1
51368e791046f4ee565dd4245a529754be53afae
-
SHA256
9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22
-
SHA512
735f5120ded36a82a642bddcfb06329fcae8d801ac00750dedec552e231dcd5f7ccef15321776385cf700bc09b8bf40eaa5eab45ac80a186ca73377e15237340
-
SSDEEP
3072:ENLtUjBnlNBqqYtaTEvbe8OFb61/p5AXtXp8RU2:qtc6/taAvbeFR6/+X8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 4036 msedge.exe 4036 msedge.exe 4064 identity_helper.exe 4064 identity_helper.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1840 1208 9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe 86 PID 1208 wrote to memory of 1840 1208 9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe 86 PID 4804 wrote to memory of 4036 4804 explorer.exe 88 PID 4804 wrote to memory of 4036 4804 explorer.exe 88 PID 4036 wrote to memory of 4492 4036 msedge.exe 90 PID 4036 wrote to memory of 4492 4036 msedge.exe 90 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3316 4036 msedge.exe 91 PID 4036 wrote to memory of 3404 4036 msedge.exe 92 PID 4036 wrote to memory of 3404 4036 msedge.exe 92 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93 PID 4036 wrote to memory of 4680 4036 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe"C:\Users\Admin\AppData\Local\Temp\9a2308501203327dd2edf8b006bdc170185af833735e3f068337f355d4fc7d22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\explorer.exeexplorer "http://localhost:8080?timestamp=20241121100435"2⤵PID:1840
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:8080/?timestamp=202411211004352⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0x40,0x12c,0x7ff9e6ef46f8,0x7ff9e6ef4708,0x7ff9e6ef47183⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:83⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:13⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:13⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:83⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:13⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:13⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:13⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:13⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:13⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:13⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13429748204864832105,12400411371422823497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5904 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
5KB
MD50bde34cf10c506bea88529c98a3d5059
SHA17589ab140fcf0cd1b48b218ec0d38a75546e1b9f
SHA2564923577c6cf860e9ffd41d41dcab51394f79411887607456e5b5e3ffe5da8f28
SHA512e5e9385e5e7fa293e104fbf1f43a5ebe0c936850fbcb85f0749f2adbf5d6a8d123de3534ba83f4247900e1469a48388bc920806b26d4e6a1a43b2e4984c3b79f
-
Filesize
6KB
MD5d210e2c00d2f6f8ca6c8cec72d992ae0
SHA149b71c0afefae0a88344659e1a8c80c369f04553
SHA2564f7ff6ca9de1412ace98acfa9da07b7c1dcc47ca826f497a7c27063e2d7574c6
SHA512fe94d5e43af78bb00b28f34f064e1cd94321e0063edca7588bcfcfd551f7a57442315170809ec3ce320900dc6def58fc99599fb98b4307f97c082619f0e0d622
-
Filesize
6KB
MD5d5267bc48d3513f4a150d5a66a087aa1
SHA16e4e71d9cd86efbcaef1148d4cb259ef0d17449d
SHA2568bb5d5f4f03987e25853df76aa5bc1b14c766cdac9f06298befff2bc7747121b
SHA512933f801f92c52306372e7695a0559e1f7f761efd914ad6efc67ac8994b83cab9d1bbf62ae443e87b1c041fd3b0783959d97374c8b28bf432c129e0393a6f33a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57a5f2bc432d4a8ae8ccdae046252679b
SHA17a8ef724c7d7e799b9eb22f2c522398f95abb5eb
SHA256c1797cd94de983479f45e4b251a03bacd7b60db809bfde0f24d21a8b634f0b6c
SHA512c8049fc4127e26e76b95cb6eac33e14294f398f331f89ec89bed5cbf66b2ebbd9caf62bd79810355a1092e3244292ca188f03a19fd63ec57d8b523b6b40a01b1