Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 02:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://137.154.10.11
Resource
win10v2004-20230703-en
General
-
Target
http://137.154.10.11
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 528 msedge.exe 528 msedge.exe 1596 msedge.exe 1596 msedge.exe 3492 identity_helper.exe 3492 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4788 1596 msedge.exe 45 PID 1596 wrote to memory of 4788 1596 msedge.exe 45 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 4316 1596 msedge.exe 88 PID 1596 wrote to memory of 528 1596 msedge.exe 87 PID 1596 wrote to memory of 528 1596 msedge.exe 87 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89 PID 1596 wrote to memory of 3440 1596 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://137.154.10.111⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff36eb46f8,0x7fff36eb4708,0x7fff36eb47182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17982472094628109712,18305932566799173381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53135123d995eec0a138bbfd2a768ca5c
SHA1ba60e689848e615e6fd5dcdca608879c170e6dcd
SHA256eb146defd57db2858174ef372a91b16dddc2a53690b90cd2613dfb96b2bd0819
SHA51262994bd6d09f632bf549ebca72b6f027524f23bfe2474155ac72bf2f1ac39b8fb3f69f8a01fcf4f258caa51ef1a0d334cf1632c65862e22067869c7cf39b4d89
-
Filesize
5KB
MD539ce1ca65aa7f3ee6270f89fb3060d3f
SHA195632778a2a0c084febe2bbfb32c8d1cb25b6f19
SHA256a4e9618c72889f71c333933ed547fa5262748da365e62eb75de07728e3b5109a
SHA512598c373c4beeb3afaeca84f62d1d81f25bf664f757c6d83b71c9b84a941caafdeaaca832aba90e50ef9525cbc1dfc552a2aebfaa13cb0cdd0ae482f9cebc670f
-
Filesize
5KB
MD51bdaa751c4cb6029b661b61befa884f2
SHA18511ff41e1d45c38f6c50af5205275bd35d22dd3
SHA256ca2a32818c50a6aad32f502eec403d2c7cc3df4962973cb98b94cacc330dc7b7
SHA5122cf0f9345ce41a1770b047c32dc35123cd32755517c80aa1d4d54e082b80c546589c0afa9f39101595d1219e3b0163e9e5064d27c7b86acabd3fb3b1724da144
-
Filesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5974030ec01f2adccd09b552a74aed2fe
SHA1ef4343f8e5fc6f1fcffd1106d49500cba1a87322
SHA256f29563e044bc2fdc5f8d7b6c156d5bd7cc6c663147361afab122aade79578612
SHA5120ced382c0b86446c86450645ba029c2fe9d568f75531a55a48570d59e6ee6ba4ed8f74777c9d6c05dc3fdc344cd39e86fb6d4ee9ddaa784224deae55d8484097
-
Filesize
12KB
MD5139a5ca9a373af21aa473a1c7c9fddb7
SHA10b9e70ef8b8c509c5cb1ed72a20aaaa47c323fa9
SHA256a3b9ddc67e4c725dfcfc00456e0ca7d8294ae93cfd54645e014dea8a8e65d633
SHA512e24f0884befc9d77b7f4f45b6b43d7a91ab73cd651bb472609d434061a54c2c5d9b94ad6d9dffa97b5efa9d285076ca2beb25825346ee1d05d24e9bf7061b69b