Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2023 15:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://risu.io/aRT9t
Resource
win10v2004-20230831-en
General
-
Target
https://risu.io/aRT9t
Malware Config
Signatures
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 api.ipify.org 51 api.ipify.org 52 ipinfo.io 54 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4872 msedge.exe 4872 msedge.exe 4912 identity_helper.exe 4912 identity_helper.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2644 4872 msedge.exe 85 PID 4872 wrote to memory of 2644 4872 msedge.exe 85 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4660 4872 msedge.exe 87 PID 4872 wrote to memory of 4140 4872 msedge.exe 86 PID 4872 wrote to memory of 4140 4872 msedge.exe 86 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88 PID 4872 wrote to memory of 4536 4872 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://risu.io/aRT9t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdca2f46f8,0x7ffdca2f4708,0x7ffdca2f47182⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5783166982090453194,992276283909292461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f7e75a88fe92d5147528c475c6908243
SHA17831682352cfdb17da7174cea8674e61e6fe7ff6
SHA2564faebaa12ccf24466cb17632b61174043ca23e183a44b29e9e3f6cfc2ce3192d
SHA512f210c56502e232b9e9b47c13eeb941a2ae7ee5b7b27742902172935e8986b23292151f21dd2d930d384b4dc74af032297b36947d1f8251ce5208cbdf93a56ff6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5d1b4682445e4dafd7e975ce861224d98
SHA1492f6b633134d3b1e8cf45da7b6c9b9eee61adcf
SHA25639389aa69620e0b52ee2e6cd3b790c6d6c6b270b66f2f29945c7fffdc6c6e1a1
SHA512644c87da41fd46fbc8e95e4d6865b1fdfe0fa016d58598208d93ba7ad1284b4e62bb4b402e86e1c4002be738e72f61b856b92c7da54f538963f7828bb098b331
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5f3e0c6eaf962af5f9e9eb8c6070d11bd
SHA10a18833f3eee9471ee1addd5efbe9eaedfa8b526
SHA256c0a1d1ea1c084e506f0c60ef7595dcd20178bfc0ce4ac0db8f8bdc77f209d56a
SHA512224d4da77cc9a404211a67c9debbebd1a5b1726d3fd8439b5f2ce2da0960da72e89eb04e33ea2e260b867ce741ee3d5ea5c9dc3252e2d9f4c9af19bcc8edd898
-
Filesize
5KB
MD571ea2c77f6ce3d22913955a6715bde24
SHA14625f9976ee9e741ea28c69096613cc92dbbed19
SHA2565d871b63fd222aee4da9fd9063ab301b53c44a7d6691ac64a9c74998c50c11c0
SHA51282057daa17f113d07398a4107239c42b957c21326c5364b4c7fa7abcd4e72e92bf018526db47b601abcbc0dca300ef504500855d1b9f5f54db1c4152b131748a
-
Filesize
6KB
MD587498d148967a1fe69cc417773b2c7de
SHA19eabed7bd32e3dacf2b44986e5b8482e34793cc9
SHA256185e3185ac754f95945197c5b3de21c71ec4499a24420e2ac6511d9e207d09ff
SHA512f68a95b7c46d83c529352bdbb20875ee2d72702ae5df4db168554fad828e62afe89d710f57208bc221a9b99e46929c9e7011a45e21a3f7f488c090a5f98adec0
-
Filesize
24KB
MD588d76733cde18621ed7567c0cfda2ab7
SHA141859bb156cfd94dbd7bd185567df2a9a5479998
SHA25617a4767dee231bad758aa0b51bd7b7d8e6201c936e5b58aa76bbe5275c0c89cb
SHA512e6555a48831412daf4af0a0039b47611428984d22ab0f851c62e68dfc9f91546542d0d68c759a988cc997b0fb1998e7aec10fa918869ed15742bfc4899f72f0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56137bb0e6a70d5968222a0a1b7e0bf73
SHA1860a05ae7b172bfc06632fa560b3a8dfa50a8a6c
SHA25647462a6af92f488a7f2d8cb6b747d193e3d082ef6742b72017aea6617b9db064
SHA512a001e4c4b942732345082f456e1c96692e5a91d14d2f8e4a4dc9913e2bae89cb0a0e7173322ae5cd16aa939d5e5b1ce177f9501296922ff3dc5ea35d8a95d62c