Resubmissions

01-12-2024 15:28

241201-swsb4ayrhk 1

01-12-2024 15:28

241201-swgklayrgp 3

01-12-2024 15:26

241201-sva2esvlb1 5

01-12-2024 15:24

241201-ss3nnavkgz 5

01-12-2024 15:22

241201-sr2d7syqgq 10

01-12-2024 15:21

241201-srh8mavkdx 3

01-12-2024 15:17

241201-sn1cqsvjhy 3

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 15:24

General

  • Target

    img12.jpg

  • Size

    121KB

  • MD5

    5d28177027ff3505cac5faf30f3fce1c

  • SHA1

    f5344740e5814ad7b09c27723798a7b283597d98

  • SHA256

    c7e0b5d2f1fc049601bab9697108bb03bf9b8643a7d741f4cd6332931cf0457c

  • SHA512

    7143044d73e10281f1d3c0979c1daa0e6ae796edc3a56dd998a1d630c41d700d3d9af742c94d2b4b61a055d56a1203328819086c29c1038e58a495af1a4cc51d

  • SSDEEP

    3072:zha4q4WMs9qabD0BWweOhHfgT3wdnjejF6I:da45W1qQD0BReOhYjyCjF5

Malware Config

Signatures

  • Detected potential entity reuse from brand MICROSOFT.
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\img12.jpg
    1⤵
      PID:4544
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultc76a905bh72deh47f7hbc46hc632d9f26ebf
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffac1f346f8,0x7ffac1f34708,0x7ffac1f34718
        2⤵
          PID:4500
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1689946469165225109,17847226215989604812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
          2⤵
            PID:1868
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1689946469165225109,17847226215989604812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1689946469165225109,17847226215989604812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
            2⤵
              PID:4352
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:1168
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1988
              • C:\Windows\system32\wwahost.exe
                "C:\Windows\system32\wwahost.exe" -ServerName:App.wwa
                1⤵
                • Modifies Internet Explorer settings
                • Modifies data under HKEY_USERS
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2240
              • C:\Windows\system32\LogonUI.exe
                "LogonUI.exe" /flags:0x4 /state0:0xa38ee855 /state1:0x41c64e6d
                1⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of SetWindowsHookEx
                PID:5148

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                Filesize

                152B

                MD5

                34d2c4f40f47672ecdf6f66fea242f4a

                SHA1

                4bcad62542aeb44cae38a907d8b5a8604115ada2

                SHA256

                b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                SHA512

                50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                Filesize

                5KB

                MD5

                f4a7c48ce4b896e35aca162a8b5154ec

                SHA1

                1c3952ef81e97297666b5af1fd9f029ebae1c554

                SHA256

                7cbf997cd4c81da7afa39ea3fbbde4c33b446fe9d46c01c6a6e542fad1892ddd

                SHA512

                7dd34e75115a7e89c287d67c717e1ac662a9a8698e404890d7d00ebc64d7ebe0ff770c8e4bf3273c97a2aa1ea46d14a89ae87579779cbe0c7526378cff5d0bfd

              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                Filesize

                8KB

                MD5

                f69d0f0555aa909b66952bc7fcf0c52c

                SHA1

                51cb22960a8a5a9afcfb00e77b9f6cd5eeef3a13

                SHA256

                031f81892f4ac674da9bdaca427e4eed453d3f97d008137128078890e135ad41

                SHA512

                8bcb787f4d847b3ccf766189d00d0124aff2bc118a1993cef4c52c079fa22c462468f211829c0268eb4cfadcbdab11c625ec1359b671566180c5012628e745bb

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\7HZYFR8B\account.live[1].xml

                Filesize

                13B

                MD5

                c1ddea3ef6bbef3e7060a1a9ad89e4c5

                SHA1

                35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                SHA256

                b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                SHA512

                6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

              • memory/2240-371-0x00000278A3440000-0x00000278A3540000-memory.dmp

                Filesize

                1024KB

              • memory/2240-555-0x00000278A49D0000-0x00000278A4AD0000-memory.dmp

                Filesize

                1024KB

              • memory/2240-420-0x0000027892600000-0x0000027892700000-memory.dmp

                Filesize

                1024KB

              • memory/2240-429-0x00000278A3A20000-0x00000278A3B20000-memory.dmp

                Filesize

                1024KB

              • memory/2240-463-0x00000278A43B0000-0x00000278A44B0000-memory.dmp

                Filesize

                1024KB

              • memory/2240-356-0x0000027893120000-0x0000027893140000-memory.dmp

                Filesize

                128KB

              • memory/2240-372-0x00000278A3440000-0x00000278A3540000-memory.dmp

                Filesize

                1024KB

              • memory/2240-392-0x00000278A3670000-0x00000278A3770000-memory.dmp

                Filesize

                1024KB

              • memory/2240-574-0x00000278A56F0000-0x00000278A57F0000-memory.dmp

                Filesize

                1024KB

              • memory/2240-291-0x00000280FEA00000-0x00000280FEA20000-memory.dmp

                Filesize

                128KB

              • memory/2240-771-0x00000278A5C90000-0x00000278A5D90000-memory.dmp

                Filesize

                1024KB

              • memory/2240-1125-0x00000278A41B0000-0x00000278A42B0000-memory.dmp

                Filesize

                1024KB

              • memory/2240-1202-0x00000278A6800000-0x00000278A6900000-memory.dmp

                Filesize

                1024KB

              • memory/2240-1203-0x0000027892000000-0x0000027892100000-memory.dmp

                Filesize

                1024KB

              • memory/2240-1213-0x00000278A82D0000-0x00000278A83D0000-memory.dmp

                Filesize

                1024KB

              • memory/2240-1350-0x00000278A51C0000-0x00000278A51E0000-memory.dmp

                Filesize

                128KB