Analysis
-
max time kernel
142s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe
Resource
win10v2004-20240226-en
General
-
Target
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe
-
Size
894KB
-
MD5
88e7965d4728603758ef5e9716433248
-
SHA1
c12bb7dbd7420851e29a5e02c4fb8240ad9aa992
-
SHA256
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081
-
SHA512
dc4c2660ba3589bf1dd539488e714993823a37d63653da04ae8c51d02684f0ed7d0d62500b57ef03529571e5cc98913f00e074f3cb32ecf6d565cec676e0b343
-
SSDEEP
12288:oqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Th:oqDEvCTbMWu7rQYlBQcBiT6rprG8aAh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{537BAF5B-4684-4718-9047-B2E0A5E30C0F} msedge.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exepid process 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exepid process 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exedescription pid process target process PID 4616 wrote to memory of 4684 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe PID 4616 wrote to memory of 4684 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe PID 4616 wrote to memory of 1708 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe PID 4616 wrote to memory of 1708 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe PID 4616 wrote to memory of 796 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe PID 4616 wrote to memory of 796 4616 67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe"C:\Users\Admin\AppData\Local\Temp\67b7941f8653816e90e49ae143d84a9f0e2a98261975fb1abd03c2b2fc01d081.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=2720 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4984 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5312 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4548 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5444 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5652 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4328 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=4836 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4924 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6344 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6752 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵