Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pastebin.com/yLLxJAnx
Resource
win10v2004-20230703-en
General
-
Target
http://pastebin.com/yLLxJAnx
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 4032 msedge.exe 4032 msedge.exe 3336 identity_helper.exe 3336 identity_helper.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4760 4032 msedge.exe 60 PID 4032 wrote to memory of 4760 4032 msedge.exe 60 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 960 4032 msedge.exe 83 PID 4032 wrote to memory of 2188 4032 msedge.exe 84 PID 4032 wrote to memory of 2188 4032 msedge.exe 84 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85 PID 4032 wrote to memory of 5032 4032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pastebin.com/yLLxJAnx1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9500246f8,0x7ff950024708,0x7ff9500247182⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9083237845319829824,8590565105871703908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5cc05661215a151aa34190f2001e6f531
SHA191f3d04260d2bd6ae9bd948c353f73747138b354
SHA256f1ad1ab9fee708a190867c7ac056deeda9675f98764d4a62e6dcbfc3396441c3
SHA512442e4af627adb9809089d0b718294f57dd81a57d886ae5a6829cd1e2472d61f94b86a9a40301015c26e4fbc0ecf1796c8ba08cf66e009aa9093e6566b0145c9a
-
Filesize
677B
MD579b5f88e892fbfda20028e67fcad429a
SHA175ae03760174c71624187723c83481834ac5b790
SHA256d11376e95795d703f7dfb5b2fa941f265348d7ece0981d40e32b82a4a8ea96d4
SHA512fe3310596656e7bbdb5a4e681dd4b927870a9f9c47c77832d71844271a463c78f366c4aeddbc305a37a3bc779b57f2877ef7e17fa7e9ca2bd3132e6f0193bc75
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c5606031cb6ab5d1080687bf6b1ee2e3
SHA1ae51463a61afe49f8cddbc925c9f7b50b544dd22
SHA256418ab312140a79c6ae226993bc657c745be0316f1a62d912ab63e70dba4e2961
SHA512bda3e5b40351da87c41c6a129d0d3f032612919ac3bc820d0f8c325598facb7a905f83a2428a36a2c323df996e0b8d28b8c02607c86ff449e0c76b52cef05fe8
-
Filesize
6KB
MD54aeaee5d948425cc925679b02160f12c
SHA16b658374eda8f72e26fe63f9d93400d1c0656e1a
SHA25646514ae27b4470fb4f7ae1724067243f385f551b9f68c6be0fac4e17b568ea73
SHA51205f32541230d2b66d8bbfe2d4f4126fdf9f7c61a66bf1e0b08e8982cfc12c59c76595ec45562a0f2b8f93cf23bdf442e3eea5947f8b2b71b556fca21e4155f8b
-
Filesize
5KB
MD54bc5c7d9f759f5044d32917c8237d0cd
SHA101107d3e5c49f89a93c9589b38037e92c6d2d869
SHA25632f4aea33b07a72d299d380ce6a277f70aa8dff28dbc52830e2f49422690d606
SHA5120f3fe15f1761f81524bca78b2fd19cd0447df9039f44d9675d9fc003c27980e8ba3a096a9469dc7de99e9c84633919a54e41385716eadae16204bbb216b97490
-
Filesize
6KB
MD5fb23cfc07f5ab169710cc6901812def4
SHA1e31788bb84414b1146b15f034b7c29e54daa3613
SHA256431faa60927179d73a829f97b62d44ca1b5011bd844ea014049cebab66396f66
SHA5129ac14c56b0a166794097635ba9a52db222a18edfcc1d993e2b12b15d83108661a3c8146047de27f9873c2a6219ce5615c4f318900b616dfb553196b7b42c9a41
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5149db718236e76901c421cd505ec9d33
SHA15b8468a8f5efb89bbacbca7fc19a83140609f912
SHA256942a6a510ff790810b709afa3cda2b51bcb279038b5b5d0a065a2efa495f3a5b
SHA512ffb701372d94cf609197e579b94ea2bf9cb0059e87db28ef150a18efee48383508fcf354b270fb54429984ff3d31fb2847e34f66a2c21ce29ed3d116f72d9efb
-
Filesize
11KB
MD5b3ecb3eafa41f7a75074be618a2bb560
SHA1de899fd8a2fb310ad28a72b73cfd02b5933fe9d5
SHA2567f465c8eabfac2df4f8abf8dffedb6fa8f08c69cac7b91a15ac9314102dbc9d1
SHA512ee0abb84c4c1d157cbced89e2cee36eba51b43cd342a7eaa49d444f82d79505b83601f377311e0a3a6d666a6d2e26f32b45e95f923dc2a397428e9953341d26d