Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows10-2004-x64
7The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
ubuntu-24.04-amd64
8The-MALWAR...caa742
ubuntu-24.04-amd64
8The-MALWAR...c1a732
ubuntu-24.04-amd64
8The-MALWAR...57c046
ubuntu-24.04-amd64
8The-MALWAR...460a01
ubuntu-24.04-amd64
8The-MALWAR...ece0c5
ubuntu-24.04-amd64
8The-MALWAR...257619
ubuntu-18.04-amd64
8The-MALWAR...fbcc59
ubuntu-24.04-amd64
8The-MALWAR...54f69c
ubuntu-24.04-amd64
8The-MALWAR...d539a6
ubuntu-24.04-amd64
8The-MALWAR...4996dd
ubuntu-24.04-amd64
8The-MALWAR...8232d5
ubuntu-18.04-amd64
8The-MALWAR...66b948
ubuntu-22.04-amd64
8The-MALWAR...f9db86
ubuntu-24.04-amd64
8The-MALWAR...ea2485
ubuntu-24.04-amd64
8The-MALWAR...us.exe
windows10-2004-x64
7The-MALWAR....a.exe
windows10-2004-x64
3The-MALWAR....a.exe
windows10-2004-x64
7The-MALWAR...ok.exe
windows10-2004-x64
1The-MALWAR...y.html
windows10-2004-x64
4The-MALWAR...ft.exe
windows10-2004-x64
4The-MALWAR...en.exe
windows10-2004-x64
6The-MALWAR...ve.apk
android-9-x86
The-MALWAR...ve.apk
android-10-x64
Resubmissions
11/04/2025, 21:31
250411-1cz7lazpx8 10Analysis
-
max time kernel
29s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
ubuntu1804-amd64-20250410-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
ubuntu2204-amd64-20250410-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Trojan/Grave.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Trojan/Grave.apk
Resource
android-x64-20240910-en
General
-
Target
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
-
Size
12KB
-
MD5
bb7b91d1685db89b58ac01a72921e632
-
SHA1
4a1dd457983a7f1bbc7943eb5fca3da6d93d4176
-
SHA256
940a563df059604ac0dc6a92a845da2f04236b86887208b89969b70c6781c3f8
-
SHA512
09e26d197b22a4553e2e87a9ee0957700766c2dcd11157b5b71744d67abfa30d71d45c7bf1081bf9337527e3b8aabde99b09bd2bd30aa302329ebf480078307e
-
SSDEEP
192:W1VoVk8X2TrWAXaR06qVoVk8X2TrWAXaR06LV:Giui2TSw6qiui2TSw6LV
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\es\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_1540_721391823\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1540_218725083\_locales\pa\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133888809153794760" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{4395E2E8-DA1E-4A17-800A-0E3D77D95567} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1888 1540 msedge.exe 86 PID 1540 wrote to memory of 1888 1540 msedge.exe 86 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 4980 1540 msedge.exe 88 PID 1540 wrote to memory of 4980 1540 msedge.exe 88 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2148 1540 msedge.exe 89 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90 PID 1540 wrote to memory of 2328 1540 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\BubbleBoy.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ffae85df208,0x7ffae85df214,0x7ffae85df2202⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1896,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=3160 /prefetch:32⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3060,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=3056 /prefetch:22⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2336,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=3236 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3300,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3324,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4948,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3328,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5428,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5964,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6052,i,4401600203634534601,11082542929562848495,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3900
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD525b05ffc7dd623762397b1f1235ccbac
SHA1fdce810417d23158a62446a82a7e1485d5555593
SHA2564839d405da2cea9b9d85ce8a67ed2b865457bfcfb19cd71d1eab8a21fe11f9db
SHA5128ef6eb3e714c5f46dd1cc8338a16d279249653532d0986643d9bf993469a4cdd61bab838a8376f0db9f35e7657a42db17846b7fc966b5bc124a5be163e4135a4
-
Filesize
36KB
MD5e1a4b9e8947229f3e696b25dc96d4459
SHA119b6c3d4dd9b70cda34e38207b4fa1d212468288
SHA25653eaeeb642ed4cfac42e845efaa68eb07452ddcc752470c0c6469ec55dca00da
SHA5127c0f1d21cc443edfd6eb7616f6ebae077eaaa5c89e550abcf1e7362a5328d30e9efac0db97cd62228c53c59f9d87e4e925faf96c6cf9fa46823e92fdff319b95
-
Filesize
22KB
MD52d31ba027981a12849a12e06893aec7d
SHA15d7a9767785fa461dca50cdebaa9df489c093974
SHA25650ec0850e101258ea55a608097f07c54072e7811b13b9f5449365dc1fba4b37b
SHA5126a15b8c82ff621777fc754de707c30a74651a9c902eac04f1b54e09a115569c6b57750140e551fb5e4eca9dafdfa51a7da1bd8ac2ce38ac70dd61341a9d1ab25
-
Filesize
49KB
MD57859a77c764e2b2cfffde0e5417e6c64
SHA1dc874358d7a8f4117ede38ae1a888b54f034838c
SHA256055960e68089f0bb8f16c040f0e962755ea1c224b455b6a8d01ac141845ccd01
SHA512f209f6eeca4b7a8ad7c819094b02a0e2678a336f0d63cbdeec721c0cbb02b14daf377e905a1e0fa510b3673f1f03c89073fe99f29dc199cea001ec5bff8124f1
-
Filesize
49KB
MD52918fdc32020f10e9ce04d2e9b1529ed
SHA16e1a2fcee2b2a86d64412a2195f726946ff2ac71
SHA2561b934dd4ca19c07ea4e4dd1dcfa96f4c32b8d8cde4f16dc54726c48e63b3d746
SHA512a5205ec25285606123df7a83bf838a4136e99e7aff99cd10af2bbf5c8741cfb2b095f411cc25f55fb235b03d7b4e863eace3dc18b4da9329e528baaf7b744d9a
-
Filesize
40KB
MD5bbb5522f1333d8a07afba66fcf9505da
SHA15d363a10a833af55f2e3c137a179c4fc871f1d85
SHA2567eb2165e9c6aa3b6528e0a18ca7012b50010a66f3ee23c90ae1317254179c2f2
SHA51267e9548b12f67ed8741c852fec110f8667d562cca3fe18d80cff5511b225e125f8da78d0e1bbca31acc69ea061c6600413bf03255948e515c3b44aa275dc81e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5f2a206388da5b0623adc9f99f51d9419
SHA1d6d5be15e8e37b978fc182022838f7eb1591b0ed
SHA25640826a6da08a8442bbe4e9af08433995f2ad1ef82b9d27e5641dc38b390b27b2
SHA5123ee254e53ec571b17a4800a35d648cc723a32a79ba27bf5e4c3abe9837633e7aea258ce37b9a0e9a74579a54d6c162a1d934ba3707c841c382a667f39520e458