Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 04:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://metlfax.com/Owos/miowo/sdss/admin/js/mf.php?id=5yoWkwslwS
Resource
win10v2004-20230703-en
General
-
Target
https://metlfax.com/Owos/miowo/sdss/admin/js/mf.php?id=5yoWkwslwS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 4648 msedge.exe 4648 msedge.exe 5000 identity_helper.exe 5000 identity_helper.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3644 4648 msedge.exe 84 PID 4648 wrote to memory of 3644 4648 msedge.exe 84 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 2840 4648 msedge.exe 85 PID 4648 wrote to memory of 1132 4648 msedge.exe 86 PID 4648 wrote to memory of 1132 4648 msedge.exe 86 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87 PID 4648 wrote to memory of 2036 4648 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://metlfax.com/Owos/miowo/sdss/admin/js/mf.php?id=5yoWkwslwS1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcf2446f8,0x7ffdcf244708,0x7ffdcf2447182⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2667812521966856330,15432946719739523821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc99b0086d7714fd471ed4acc862ccc0
SHA139a3c43c97f778d67413a023d66e8e930d0e2314
SHA25645ef01f81605bfd96126d5520c5aa0304c7fa7d5fdb3e4d5b2dd2bf84e2afd96
SHA512c308fa3eda9235d67a506a5f058fefb9a769ec01d7b0d4f5a2397892cc4f8155301c55c1fac23bebacdd087ab3f47f1eacc9ff88eff4115a7d67aa7b1d6581a8
-
Filesize
469B
MD5ce6524dc78ce98c6f884075493b0aa3c
SHA1ec2a83c4d574e33bff925640a912f983373ee954
SHA256a644215df0253e2350a1a7ee17fbd092364ea9feb9f380d39c85427d40d8a992
SHA5124e8eafbb8a8640b07b08adb265c1769b5725fd6b113a9134e849287d17397c3264843396dd5d2b58ade3c28c34a455e098f86a00d7823f92253d825e1fa6e46c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5df3efc404248e2d200247bfe74fc888e
SHA1e116eed186a5e3731090051a83b4d05001464f8f
SHA2565153b7e45ef05e0365ae7d9a6f87e5fabf03e8e5331ead72dca8627b85475fd6
SHA512071c88ca80a56483e9448ca38230e23ab2ac9942a785f1bff6c28488d54ac8f79a9b07f32cf85ef77b10147b4df8bf66ee1c2b3aad3ca7baae846d6073e70e21
-
Filesize
5KB
MD54cc4837ff1d2929084f95f50564d297c
SHA15a7c94f0a370a7e3c98e04c884cb291de22b7c0f
SHA2567d5e7a90fab552e51046e0fa4e50b3734a131041ab6ebddc852577b7096e051d
SHA5129ec1422f22b98a6129ce7fa22263ad6a9da87e85673c8cb21a36ac7df2091226228c483e7d4cbcd49072c77eed5dd60d507e1cea6b87fc24a8b126e4899a4a52
-
Filesize
5KB
MD59acad839f9c2ff79d47eea3fa77cf8fd
SHA170a9215c72dc30559d9af5b9d1adc494ac99fe23
SHA2564b65c3a86da00138f103cc57db962a04126089370bc33be0bb5a976df298bc64
SHA512cf7acb39168bc6bca751fa0590237bafe40ad5c559d5028e0a267dd427f9747bcf7a49a0f10f72ee94ccc30885579e2526d2dc079f05579f4ff09b9c47481182
-
Filesize
24KB
MD596f00bbd6a174879c58220f95f0115f5
SHA1d3d7f82b0bf27daf1b3903bfe050c2d05422050f
SHA256644442e740a8c0bb20f712f6f84f5bf4a81bb29d4e9446b2832ca65618961107
SHA512e7c5e90eb85aee7b81b9c163f618ad3789a48b256040f6f00eee7fce52c60e1ff491bf0538b9c846fb115b73163710e46a45ce056e3b41ca59d88c421502ccea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df6e6e53addb4ce4662780572cadf793
SHA1ad6ca1f1fe98dbb8badc91a2a8ede6c7c6c88605
SHA256c933ed819ac3c92eb5adf3a5c9af3e13fe027d32e3fd90d8533c55097d104852
SHA512780ececd841674954e90f2d6bb1d3f517b52a8f600b5d3a366d3ccb2679e436e05cf511cd93a77371705b028de23b9a9099b17fe66315d8e76f1026b38df7db3