Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 20:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20230703-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4432 msedge.exe 4432 msedge.exe 1908 identity_helper.exe 1908 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 232 4432 msedge.exe 83 PID 4432 wrote to memory of 232 4432 msedge.exe 83 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 3408 4432 msedge.exe 85 PID 4432 wrote to memory of 4616 4432 msedge.exe 84 PID 4432 wrote to memory of 4616 4432 msedge.exe 84 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86 PID 4432 wrote to memory of 5016 4432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8be6c46f8,0x7ff8be6c4708,0x7ff8be6c47182⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,14894649535133121524,211556642365796076,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59bd7ef56265713aee64dbedd43e20af2
SHA1df5edae53dc2318056202990814bc85942b6788a
SHA256b41947aa3ce9ac24d15fbc865e6236c0cc49df5dabc0c99fbe9d48ae68047163
SHA5122541785f5506ee008fd11c7794afc7dc56e052e2a70a564469088f7a02f28b80105878a4022585a79526edf8677247375c4da0971c0ec68c6384a663f13283a2
-
Filesize
496B
MD5aadae93b8d636d034aee972c3635d7b5
SHA1d8c1119ed585b5403056f37515b98d32d3275ab9
SHA256baf498aa585a836559bfdfeba511aa8392d8fac7d57e594062dbad9bbd5c8327
SHA5120a27888dc32f54cf0f1dff75e1f38813c60a0e0d04c16eb2f0a6bd898455f31f0008aa550b1e36f342527d777e71d9ef3e7e88788366f6b64cfdf8ece6e7bd81
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5a8ebafda7d7a065a0bb7783dc2a5fe8f
SHA1692ac96395b143894f2462e1afbe9b68897fdb22
SHA25644c0983d64bf09f3480708efd711f2af3f6ce875741a76c4cbd349ef0d9e615a
SHA512c93daf7c96408c2bc70c76f06ec6e660d919fce416287f57c67be6e6bb1fa944089d6616eb74f67cc6fe68230eb682d6bd69fb0d73cc94cb7403997143d991eb
-
Filesize
5KB
MD587c2e3d9fd105d6d6f317bb7497f9552
SHA1525a10f30437b67fa087d052b39780cc5a2d93af
SHA256eb73345bdabf0185591c7e7aa6cbca26a910f2f83974e795976c799038a34219
SHA512de9a79bd9e833c3751c25ec7d9e1ea3face2f7e359a2c624f0e3deb1deca35370a2f6e421e3d3da8e92f183e10a82af0ded177b871532dc635153c67b3b4a1d1
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD52167fdce1e5c62f2b035dc85f662ac02
SHA12919433349acc242c3b1407ba7f59d8375920c05
SHA25657fe0116b06f4e1fa2fb57e645aafdf84196eb4e8d8c6b756cae3a86e06bed7b
SHA512f4f8969283496f9ce80461ef1ae84a32b3e5e969387d8e2f332dd8ce6fe77fff7c634dcee78c0c5b4ec6b91a91755fb56124a6a3f504e03c0ad107535c7b10d8