Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2023 11:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://haloverde.com
Resource
win10v2004-20230703-en
General
-
Target
http://haloverde.com
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 4808 msedge.exe 4808 msedge.exe 1016 identity_helper.exe 1016 identity_helper.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4028 4808 msedge.exe 64 PID 4808 wrote to memory of 4028 4808 msedge.exe 64 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 2092 4808 msedge.exe 85 PID 4808 wrote to memory of 3392 4808 msedge.exe 84 PID 4808 wrote to memory of 3392 4808 msedge.exe 84 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87 PID 4808 wrote to memory of 3480 4808 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://haloverde.com1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94ea546f8,0x7ff94ea54708,0x7ff94ea547182⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,721920618951075563,5151620722654358978,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD53aec15c56c80dee0ed8273be44aaec76
SHA19848a8ea546b5b549887165e8f3cf88b43789c36
SHA256f1edce12c694804e321c1f9a1a7bb088838010e09481b3e0eada68c0ac50c578
SHA5125f4c8e376e557ebc5b876149d635256a4ac4ca0c639f570fb1930f971fed2a965b19adff9230693fb20b3457a8563d7f0cf65083dac199a955e009109305bc70
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
804B
MD52d495787c12d0a3cd1dbbade54889e78
SHA115c358f3cc61d680431aaaa83e580046da571c1e
SHA256e6f08ff5cf7ecd2605d09437a9263b6239aa103d28182eb5dd09509dea985161
SHA51294b855cd2944dc7b3dd37e301739db8fbd816fc06ed761cd326db029d4ab99a4040ad5b2ddf42a54d9c8bb0e0e005d675bbd6ff5b9370f1e9808de6076177497
-
Filesize
5KB
MD532ae43527068737a02b4928bd0c9f869
SHA1dc2a100427545c04751fd9717c34f9b8e6496add
SHA2564bd0de2dfdd4be4600a76746b4178bb8da5c643aace43a3cfbca7cefc92b3cae
SHA512230c1c5883ed10b35302230c874fe19cbb69df184da859a52eb9195fe86d083a698b27e5850a6d63a9452d5861d308d159218a74ff2cb55110918031f205ff80
-
Filesize
6KB
MD5d5ce8dd06f024910a70af2d0cd17d6b7
SHA15dff045d9c5e61e395d3ec388b7108787dfeba2d
SHA2561959377c12b2756e16f95a36df5af39aef9616ddc30b774b3d2c5a14103a2710
SHA512e95a1159f2fd0f6f95a104bd5a5a120daa5eefd27b47bb2ddc8f7623d85fc4210fccf6c9259bd1c33b2d09140e956b61fd1dc12cb376fe99aea605c4d6bef2ba
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD568a57215bb4c374d9f3b9509e8ddefe6
SHA1a2ab338174fc77c148e9953c60799311e9588e68
SHA256b42949109b9208a17330c032711329e2c2099d37fc7d43c46672b67bece7d31f
SHA512812b20c57d08b7d633e0010fdfa23e33c2b224403c8710971f774c9238431ceacd551ae1a11fc22b658dcb6e191345ec553d0df16d176148634181b8517c8688
-
Filesize
12KB
MD5f8300bf71b099f5a78a87a6c50bf3cb9
SHA1be56d937995afaf40eb8ce7597ccb75e06cf56aa
SHA2566f39c916ac3a40fd63586e6ba3594cfb0ddbfce1ab855e51a991051bcbb66c1d
SHA5128265ddb1703c84cd79e047413f661a3164f9f938dc452c9fe4cdffe7e300f376827068d1105d2c6d7bade57343f51e39240936c2416c13045cb020d891b8f2ca