Analysis
-
max time kernel
1779s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 02:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://alturl.com/3zfkt
Resource
win10v2004-20230703-en
General
-
Target
http://alturl.com/3zfkt
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4128 msedge.exe 4128 msedge.exe 2736 identity_helper.exe 2736 identity_helper.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 5052 4128 msedge.exe 83 PID 4128 wrote to memory of 5052 4128 msedge.exe 83 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 832 4128 msedge.exe 84 PID 4128 wrote to memory of 4688 4128 msedge.exe 85 PID 4128 wrote to memory of 4688 4128 msedge.exe 85 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86 PID 4128 wrote to memory of 4796 4128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://alturl.com/3zfkt1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ff8c7bb46f8,0x7ff8c7bb4708,0x7ff8c7bb47182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14199984112253002185,9964140308796238942,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4dc1⤵PID:4820
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9e6242a1-f954-4c6f-a75d-b38d020e93d1.tmp
Filesize5KB
MD5ab6793c2f28363178d7a5ef981adba7b
SHA1c3b71d530e9697e1563e53d0b4439e079870640e
SHA2561569e5156688f2cf654e6f5881da785e19bc327d3fdc3ca1f3db53336b1b7f66
SHA5123ea71b7ecedd4f548b4c2bcdaeb372cd93ce446a21fdd1e7cf8c2f4dd204b3514f5acf9c9ee69549d481a8a44a7a6286a026a490eb93e0dfc5577ffd3a71d911
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f44b0d2b8cfc89b8d678fc81c8dc5795
SHA1df22baaa61c9bc3ef1a86c1d673f9936f858f462
SHA256f92742f10abcf931e76832ab913b41010335a57162c86bdc264ba52d320de9ff
SHA51262be546a9190cccbbe04f3c2a1850dac9360eb0a13d4845c0a1b6fe6a1fc7a9e37753487e369d4432d5489cbe2866b8fa199f8cdcfbfd5b0f843b57565857995
-
Filesize
456B
MD52a2b06071df339fa0d7cb15e5d2b1b37
SHA1ef741bfbe7c38f8d6b17fae6133b8a94eeab36a4
SHA256d93a50ea6175c26a03fb7f9338d226ef3d6ca155c99c976af92b1897f2251b94
SHA512299421a1b637a2503a3e892b21a6883465ada7da865af4858ec0cb0b3af235ae51d026a484716410b81b319452a9013d780a01dd5942aee6762ceb968d278ef3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5c3deebd6a5bb7efcd42a38133d0ad146
SHA11f74c563e84a4a21a4b4807a60140605ad9c617e
SHA2566b694a7dc0ed106cd321c0a6bfa31ddbe9b5b7e18b27a110bed07cefcaa57154
SHA512b0e15873b3bec30b991f06c7cd5db80d8211583a1bf39570225a0395833b354950442f6ba4902658b2e06ca2821482b208b679f2da3a4c0c65bf920e648c0180
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD52e943fbbf9b8e33c613bc456b7a1bb79
SHA16b99297dec5ceaaba6e32973bfce0e6ea15579d1
SHA256556d340d60769ef92016fa6e015732b216ca3c496210ee7b2029608456d3af22
SHA512919cf8fac08bc572fe180f191056772bb1c750ba38f404afa1c99fed5681d8f591ecd18b33d2b5689b1f7bd0528822c4f4088d61e225c5bb9e5bf66724e1b414
-
Filesize
12KB
MD57a40219d4f1e0f87effe39af420e2b65
SHA1d0a7639a136d9e71c46c8950affae0f5e84887e3
SHA256726723ec578eb996bef2b71f3ceb97191b8ca539571221e28815f21b8aebd202
SHA5120980d8a4c3de2f6b146b375c3aa2af3866ef6a5b756e2f1f390795a5f7590850fe9c8548321a4b4d77bdd8daa5a8a63222d1c09bbbac2ca38bdb4c87e8f4308e