Resubmissions
23-11-2024 00:44
241123-a3xw2stkhy 723-11-2024 00:40
241123-a1nwcstkd1 1023-11-2024 00:39
241123-azsg6ayrhq 3Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-11-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
download.jpg
Resource
win11-20241007-en
General
-
Target
download.jpg
-
Size
8KB
-
MD5
fd59c3cd5e5088281635eced5c20ccaa
-
SHA1
9ef4149257a4d39e6624cddc320f59f5eee3798d
-
SHA256
178ad69c097b6020ffde876881fe38499ca82be6781e7d47988d3422872a1440
-
SHA512
7ed57054b81b5749fded7622510978c82d2bc50602ca845f20234292130a48bed31afcc4da1da6265d7435d1f46826330a22f33b71e242ab59d77046e6761628
-
SSDEEP
192:N+wAO7JR1SJBL+n+tiNWVxpzS7CYwPW7NDaMMQOOtk3/aHOSqQcC692pXu:N+wR7JR4JBL++xdQCd+JMSohrCHp+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 3628 msedge.exe 3628 msedge.exe 796 identity_helper.exe 796 identity_helper.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 544 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1496 3628 msedge.exe 83 PID 3628 wrote to memory of 1496 3628 msedge.exe 83 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1136 3628 msedge.exe 84 PID 3628 wrote to memory of 1468 3628 msedge.exe 85 PID 3628 wrote to memory of 1468 3628 msedge.exe 85 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86 PID 3628 wrote to memory of 4888 3628 msedge.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\download.jpg1⤵PID:2940
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffefd673cb8,0x7ffefd673cc8,0x7ffefd673cd82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2376 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15568456382619616338,12415512762448533582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
5KB
MD580387d597880ca200aeb324a7a3d12e9
SHA18b2383ff1d8707f443ea2219786f4c345bfac070
SHA2564292bb1a7456b25a330a8e2fcaff3e81003b1fa145cccf7a9d78327c7b5306c3
SHA51272744ad77fb1d5c53e7795bfcd60892b648ef00ab814cc302ba24792b4631d43497b6cfe39ac0f28f9059e5f293b8c3154d00ebb6677c6b1a16bf1d1fc759f94
-
Filesize
5KB
MD5129b4c90a4d607cdf62c1f267606fdc4
SHA1d50e9f21e028ccefe48d1516681c0f02da6436db
SHA256fb5d0f193473b67770f0cd8f717b5bed5f8cb76ee1623d3929a7ac103b1ba213
SHA5123bab63b6cc3d43c4d1aa272ea90638a97227a60957b2c578efca8271b65175eb3dbc94dc6d51216c4c24372d529ce5e9fb8ecf3dacc1b9d05a4b18a6287a9b9d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD52dbebc5323fd210b428cb5fbae9cc9e8
SHA1be9073a49b095dac536d0968e289860f6c89ce60
SHA256fc2842b673bcfd6c4f61ab13d34e32dee44deb0d53152752ed7fc56e734bcdfa
SHA512d30244a9c162a86a6fd80781f506ae398e499e8edfcb08438637f6dae0feff8aeeda1bd837402700f43e3840c800fa9d183085e6ae1296046a1cac7151630718
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5b7443e89f0cb29d51ee6a257750e54d2
SHA184127eebf275e781d5276af6fc4d09c5a6bfb7b9
SHA2568226877d6ab2e4834aea6bc71bd9865b28d0bd1ec2e8b4c23b8acf0301c56f26
SHA512446cfe25d82f3bbf7badd324cae691ad62e13bd7469e415f47b9141bddf30679219c672937f4f6768796c2936c3b9c557fabbda1fb51c5edbb7c1964bffa17be