Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 18:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://obsidian-1-c4450045.deta.app/api/script/proxies
Resource
win10v2004-20230703-en
General
-
Target
https://obsidian-1-c4450045.deta.app/api/script/proxies
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 4276 msedge.exe 4276 msedge.exe 2556 identity_helper.exe 2556 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3928 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3004 3660 msedge.exe 82 PID 3660 wrote to memory of 3004 3660 msedge.exe 82 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4924 3660 msedge.exe 84 PID 3660 wrote to memory of 4276 3660 msedge.exe 83 PID 3660 wrote to memory of 4276 3660 msedge.exe 83 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85 PID 3660 wrote to memory of 2132 3660 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://obsidian-1-c4450045.deta.app/api/script/proxies1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1aae46f8,0x7ffa1aae4708,0x7ffa1aae47182⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2976406048899190339,11857366322059380217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc99b0086d7714fd471ed4acc862ccc0
SHA139a3c43c97f778d67413a023d66e8e930d0e2314
SHA25645ef01f81605bfd96126d5520c5aa0304c7fa7d5fdb3e4d5b2dd2bf84e2afd96
SHA512c308fa3eda9235d67a506a5f058fefb9a769ec01d7b0d4f5a2397892cc4f8155301c55c1fac23bebacdd087ab3f47f1eacc9ff88eff4115a7d67aa7b1d6581a8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5011317180c38faae5c889fa45e66933f
SHA1c6d21d1032aff67bad9919376339ca40f433ed43
SHA256f345df310419c6dc669a299ed2e89f94e1a6b13fc791fe7e462626a606af8000
SHA512530442c234ed4af7e906688756e026fc2c160074013cfb98fb699aa232fea575c150a36b54b526579e6172c7570a08b57c72a7654d060554ad850d18065e82b4
-
Filesize
5KB
MD59b1e216747b552f01b76cdc611085350
SHA17b01708cd5e732cc0aa6e9ac62c3faf63b29e2ec
SHA25696e8935fb1206a9f4b9995aad03dd98e94d7b2430887ba5bd444f777a687ece7
SHA512eb1a785d57e78b0fd2569e8f498ffb0d539bf7345882d4a3b2d7067d518bbbcd6424327fd699d4fe25a4025ab21f13447fc06b523e2668362823da35539175ee
-
Filesize
6KB
MD5d1cb1c1c74b46dfa1d3b2f6d43d0b917
SHA1f014dd0e52ce8d184601abddac1a96577198c21f
SHA2565a5da893d1d1539214f2e391ab90204906bc2f0e89e60a9478a1ea9e0c3969f1
SHA512bb69c04e22f9f6b9b254e019226bb23444792d0b2b4cb58c68264d91763e919f933aeb8b4fa4664e89fdad97f98c2d41054457e144122d205863ddce9ac6babc
-
Filesize
24KB
MD596f00bbd6a174879c58220f95f0115f5
SHA1d3d7f82b0bf27daf1b3903bfe050c2d05422050f
SHA256644442e740a8c0bb20f712f6f84f5bf4a81bb29d4e9446b2832ca65618961107
SHA512e7c5e90eb85aee7b81b9c163f618ad3789a48b256040f6f00eee7fce52c60e1ff491bf0538b9c846fb115b73163710e46a45ce056e3b41ca59d88c421502ccea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD570291ff115be16ffd07c963d558baa7d
SHA1548eb32929162a84f34c02e5352501bf691e7917
SHA2568d8eacc829472c68f7dc7e79128b4dc065a46776aaeedb608c146fb4a7bfb08d
SHA5128f58f725e11ced18bff26d949a7e95f2ffedb00433fdaa9704ed71cec657b38c8a66da4d887cc077bc4641386900ad5bc964939a3d55ee184abdf12ee7d5302f
-
Filesize
11KB
MD52bfd27b5618b97a627b065eb655752ec
SHA1c06a4e67051b211497664f6bcc1425fe04c55d85
SHA2562350fe35197e62c301a421d40810a7c10b878ee4fdcddb3743a1ff91814dde87
SHA5126d864dcbacacb591a7a283510c91cecc67c0b8806fc05cf1aed60fa673521fc47462eee8abeaa5643f1741250474d27a7cc818c434b479e396c49eb050dedbb4