Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
Batch/Apps/FraxWare.bat
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
Batch/Apps/winrar-x64-701.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Batch/IncogApp.bat
Resource
win11-20241007-en
General
-
Target
Batch/IncogApp.bat
-
Size
3KB
-
MD5
ee8be86f2632ec32290cf499e0d6d74a
-
SHA1
e6193291d4438fb4605fb19409c94580ece3f296
-
SHA256
c5310c3b67b13614b915e05996d377a6e108a34d6945ba7f4082179506bb3b03
-
SHA512
960ac53df8fbd2756669090fd099ed7a383c164d992463d6e947cfb4713c64aca1b554470a9053240aa8bfdf3f2e37b54ea922026bae2aa40a7da8f8c1fcf183
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 1664 msedge.exe 1664 msedge.exe 4352 identity_helper.exe 4352 identity_helper.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2608 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4188 3188 cmd.exe 78 PID 3188 wrote to memory of 4188 3188 cmd.exe 78 PID 4188 wrote to memory of 1864 4188 cmd.exe 79 PID 4188 wrote to memory of 1864 4188 cmd.exe 79 PID 1864 wrote to memory of 3824 1864 query.exe 80 PID 1864 wrote to memory of 3824 1864 query.exe 80 PID 1664 wrote to memory of 4688 1664 msedge.exe 87 PID 1664 wrote to memory of 4688 1664 msedge.exe 87 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 2904 1664 msedge.exe 89 PID 1664 wrote to memory of 4256 1664 msedge.exe 90 PID 1664 wrote to memory of 4256 1664 msedge.exe 90 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91 PID 1664 wrote to memory of 2484 1664 msedge.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Batch\IncogApp.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c query user2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\query.exequery user3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"4⤵PID:3824
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:784
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaaff33cb8,0x7ffaaff33cc8,0x7ffaaff33cd82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,877840121902977991,16244762742970857531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
5KB
MD5e3478de3b6348e844aeacec9f126d4c1
SHA1614bbaaaf39eabff2a546e71cbfa858f2eb25104
SHA256bc900affb6c75f8e0f538bf6a139f372abae5bb051ba3d5efadff9c6a095998f
SHA512379786b354d5669b6a6fd067b20f8fc9b7aba64e5b2d42101c2677be52f511626eff4edffebe4f153f07cca4fb57bc13e60789536fb6d324c9d12b20642f7f9b
-
Filesize
5KB
MD59fc95f0581c7f022e15f3f3233dece34
SHA14645b48ea50f567bf8ea00905fcf4e88022eddf2
SHA2566188d203b25bb98216ce4ebd0dea5607264651b957cc3df320fd4cde5d741cab
SHA512af6efcdb6dae127e5fb98962b5d821bbc7079413fb10f63f6de76b9edee6913618968d205decdba993e3b5f29ba22db16bad75902c66963e9d7507df4c7813b5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5301eb21462ff61aa54707b1ba1daaef3
SHA123c5572ca5e371b454a456352579d2a6eb1c932f
SHA2565e518161de92b69455d4c6d0176c67db6d1e60741e5355578c385f978a3e9a33
SHA512ad9662f4b3d23a648d593b37a599babeca3c256a83b5b5e5d3679037c747da53bed9e5589e02af116b7be5da82dada0b922632ae038568c27a2bce896ec6c586
-
Filesize
8KB
MD55197e6fe26d242e2abc8544a678e8bbc
SHA18725418e071344eca4b7f655e29688569eaf68a3
SHA25625d6ad82d7a17a8346fcccec6f7b17e48b7bfd5f7da9f9aad7ab7f8d446a7228
SHA5126331269070fae97da84a5cf231cd87f2b397038192f65a73adb4e871b4b2946fb24da71b47b89188c561e464ac8ef66d230fed95c2897631ab6f520ea2b20e2e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58