Resubmissions

16-02-2025 01:02

250216-bd8gxstmfr 10

13-02-2025 19:41

250213-yd78gssrap 10

Analysis

  • max time kernel
    817s
  • max time network
    904s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2025 01:02

General

  • Target

    0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe

  • Size

    355KB

  • MD5

    b403152a9d1a6e02be9952ff3ea10214

  • SHA1

    74fc4148f9f2979a0ec88ffa613c2147c4d5e7e5

  • SHA256

    0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51

  • SHA512

    0ac24ef826ae66bbba8bd5de70cb491d765ae33659452da97605701b3a39a33933f9d2795af1e8a8615cc99ae755fccc61fc44737122067eb05d7b1c435a4ec8

  • SSDEEP

    6144:Fs3o0YvJiTQLmCUmLG0HhLjSKHkYp6dDERdBHMlU8LF:Fs3FmDL5P6YpaAt8LF

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 1640
      2⤵
      • Program crash
      PID:3976
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2160 -ip 2160
    1⤵
      PID:3380
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NEEyODYyQzEtOUQwMi00MTc1LThEOEEtNzBBRjM3OEJDMjZGfSIgdXNlcmlkPSJ7OEY5MjI2RUMtNERBQS00Nzg3LUJDOEUtMkRFQTFBRDk1MkIxfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MDkzMEI1NTEtN0UyNS00NDlFLUIzQ0UtN0I2NTdFMDg4OThBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjI4MTU3MTI4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:1240
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\MicrosoftEdge_X64_133.0.3065.69.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      1⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
        2⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1424
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff669086a68,0x7ff669086a74,0x7ff669086a80
          3⤵
          • Executes dropped EXE
          PID:992
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff669086a68,0x7ff669086a74,0x7ff669086a80
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            PID:3092
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x1ec,0x230,0x7ff7daa36a68,0x7ff7daa36a74,0x7ff7daa36a80
            4⤵
            • Executes dropped EXE
            PID:1016
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7daa36a68,0x7ff7daa36a74,0x7ff7daa36a80
            4⤵
            • Executes dropped EXE
            PID:1696
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7daa36a68,0x7ff7daa36a74,0x7ff7daa36a80
            4⤵
            • Executes dropped EXE
            PID:2988
    • C:\Windows\system32\WerFault.exe
      "C:\Windows\system32\WerFault.exe" -k -lc PDCRevocation PDCRevocation-20250216-0120.dmp
      1⤵
        PID:368

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3FB2335-1351-4F90-80E8-1DB1402FA140}\EDGEMITMP_FCED6.tmp\setup.exe

        Filesize

        6.8MB

        MD5

        bdb1aecedc15fc82a63083452dad45c2

        SHA1

        a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb

        SHA256

        4ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f

        SHA512

        50909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d

      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

        Filesize

        3.9MB

        MD5

        4aaa893417cccc147989f876c6a7b295

        SHA1

        b1e35c83518bb275924ead0cd6206bf0c982d30f

        SHA256

        2c38e3c3f18e2d3fb7f04336356b9b5186cabe06b3343beec318ef0def1a9eeb

        SHA512

        109e0c88977fae65a4950fc38393ca32a70d68ef41aeb75b28e6566e0fa626e32e31be38308e7ed5b6a8ba1f56fb5f2133a07aa8bb643224c3dbb089ce9cfd0e

      • C:\Program Files\msedge_installer.log

        Filesize

        73KB

        MD5

        0d7e2e9426cd169d5d0cde1aede827bf

        SHA1

        2b0324db53aa9a2cd93b5e42fc43d5ddda93a407

        SHA256

        8602472e30cc72d6044c3865f64bbcc4393dff1ea032af55697fb68150448caa

        SHA512

        ef2a3edf75645229b207b78886be9172f70a29bda8888f522a10478e70e8c859b4fc7f63a7a7e58e043c9b51107eddf78cc166f426b5749bc10c5e8d7c1942b3

      • C:\Program Files\msedge_installer.log

        Filesize

        102KB

        MD5

        feeb0970e443d3244d2223825334ea43

        SHA1

        78948ab6645fb3cf34753d5522256be72320cb1e

        SHA256

        381a6eee0a1cfcb7b871c8bb60a04b606694453d8aa58c047245892266f9ef6c

        SHA512

        b1c15208c2daa029581eed7f7ad1b28b4f913ed3afd39a50f1277e5b3875a5b6e86730800ca673651e431c06e8538b1a533ef54dc7bd7e002f6b363dc8b333ee

      • C:\Program Files\msedge_installer.log

        Filesize

        103KB

        MD5

        67c2becf5d2eb1b16acfd6754858afe0

        SHA1

        8bc4a1481334058d2de1af0077a47dff503cc618

        SHA256

        4d90870dfaae21d231dd27025532790eb1b7c018b30cc629994c9100e187e226

        SHA512

        ec4b4a15ce420d4a6393fa73254782c850baeff06ade39954dd8c352d3c2270ac24c9f96a8c52473382ffdcb93870fbef7c9fbcb13e703f32b5c5f901d80f101

      • C:\Program Files\msedge_installer.log

        Filesize

        105KB

        MD5

        3f45c0c1a615a40fc22ac04a678b2b7e

        SHA1

        858da67334ab9220a53825e61733b336321a1060

        SHA256

        5f67ff526f7706813b9b46a7a7a93dff8cc6a2f3e4557b8b2bee7ce7e8dd22b0

        SHA512

        ab6c19fbb0001cef78ee3a2b823762df7ea8272e9a4d63d5c8a2c4f2afbe38201cb4887fa9aa8acdd5dc563787cf0e3c5aa4424b9995fca833d321db3e13177d

      • memory/2160-8-0x000000007454E000-0x000000007454F000-memory.dmp

        Filesize

        4KB

      • memory/2160-7-0x0000000004F60000-0x0000000004F7C000-memory.dmp

        Filesize

        112KB

      • memory/2160-0-0x000000007454E000-0x000000007454F000-memory.dmp

        Filesize

        4KB

      • memory/2160-9-0x0000000074540000-0x0000000074CF0000-memory.dmp

        Filesize

        7.7MB

      • memory/2160-10-0x00000000077D0000-0x000000000781C000-memory.dmp

        Filesize

        304KB

      • memory/2160-11-0x00000000078C0000-0x000000000795C000-memory.dmp

        Filesize

        624KB

      • memory/2160-12-0x0000000074540000-0x0000000074CF0000-memory.dmp

        Filesize

        7.7MB

      • memory/2160-6-0x0000000007AD0000-0x0000000007FFC000-memory.dmp

        Filesize

        5.2MB

      • memory/2160-5-0x0000000004C40000-0x0000000004C4A000-memory.dmp

        Filesize

        40KB

      • memory/2160-4-0x0000000074540000-0x0000000074CF0000-memory.dmp

        Filesize

        7.7MB

      • memory/2160-3-0x0000000004C70000-0x0000000004D02000-memory.dmp

        Filesize

        584KB

      • memory/2160-2-0x0000000005220000-0x00000000057C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2160-1-0x0000000000200000-0x0000000000260000-memory.dmp

        Filesize

        384KB