Analysis
-
max time kernel
58s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 22:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.brewtops.autos/e995I23l95b86ir11U5ecdZ173aW25Q6brHs6cIsrZfwgIrIvZ8EGsi7AQZR9dR6P1yo0W5FUwDj/Nazarene-brimming
Resource
win10v2004-20230915-en
General
-
Target
http://www.brewtops.autos/e995I23l95b86ir11U5ecdZ173aW25Q6brHs6cIsrZfwgIrIvZ8EGsi7AQZR9dR6P1yo0W5FUwDj/Nazarene-brimming
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 4376 msedge.exe 4376 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3196 4376 msedge.exe 33 PID 4376 wrote to memory of 3196 4376 msedge.exe 33 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3180 4376 msedge.exe 85 PID 4376 wrote to memory of 3140 4376 msedge.exe 86 PID 4376 wrote to memory of 3140 4376 msedge.exe 86 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87 PID 4376 wrote to memory of 2880 4376 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.brewtops.autos/e995I23l95b86ir11U5ecdZ173aW25Q6brHs6cIsrZfwgIrIvZ8EGsi7AQZR9dR6P1yo0W5FUwDj/Nazarene-brimming1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa78cc46f8,0x7ffa78cc4708,0x7ffa78cc47182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,2133421749494554784,2499276325687643617,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:2564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bf009481892dd0d1c49db97428428ede
SHA1aee4e7e213f6332c1629a701b42335eb1a035c66
SHA25618236c88bc4fe576f82223cca595133aa3b4e5fd24ebac9fd515b70e6f403ab4
SHA512d05515ff319b0b82030bc9d4a27f0432b613488f945d1dae8b8dfe73c64e651eb39f4141a5d2e157e2afb43dd1dd95b6611c1003ac4e2e80511e6c5cd7cfdf11
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ddfb2fd7e042ebbe16eed4c5284abad4
SHA13da7609e8d6d7de7863cfad7459bbe6ed536c0ce
SHA2569964aa03bf0c67ea143c0410b8b41524f174be5464ac3ea9bc84acc4107fafce
SHA5127210735d3fe69b20fe1539c1a38403585bc4b84b96c027e57f189bf2d6dbdb22837f31cb28c6c3e0f9280b84993d6a4561a7bd1e1dd9db1d0832a8bb7481df15
-
Filesize
5KB
MD54d70b1bb09a7fa744a6a3c244080cfec
SHA1fb9c7edb5e26f22b57b4678cd1901ce8f1bede43
SHA256d2469059ef2383767bec472f0318ab69ccd32b67fa8ed21d358673004c6ab5ef
SHA5124b3c450c43078c773516ee5bb8a48e2d82220914ceb0ba7363b113770e0e088b1d16beaa54c745195bd86a6e1243695fe421c0ef57907366e7d3c4148907c0c8
-
Filesize
5KB
MD5d5c130e6d6c0094fc47805228656371a
SHA1793405017663f50fbd6b93d75c888e96a2df5cd3
SHA25679ba5af225e4d385f8b39bb99a43653a1062428525874a598c868615fb8b47a9
SHA512ec0bf14069846826aaba791805fec9f020d0207b72ee964cff30b93f026739cd6ceabe14bec90869404bc606544a7d170c8dce59fcbe740fed5b06617c8012d1
-
Filesize
24KB
MD525ac77f8c7c7b76b93c8346e41b89a95
SHA15a8f769162bab0a75b1014fb8b94f9bb1fb7970a
SHA2568ad26364375358eac8238a730ef826749677c62d709003d84e758f0e7478cc4b
SHA512df64a3593882972f3b10c997b118087c97a7fa684cd722624d7f5fb41d645c605d59a89eccf7518570ff9e73b4310432c4bb5864ee58e78c0743c0c1606853a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5390f9dfc72c2bdb4f1e57668070c5a2f
SHA116c0af0cba63291aca8499bf04dd52adc27edd5e
SHA25638af6ea51f0cfbeab3fcca74b40cdd5148ba5bea654100e2436357e7cbeb00ae
SHA51291988f0ac6fe98d8b7cff88d6e34a814c633c6d3bb2c56904d68e2a6ef35b9071314f3b2e68d2d269d6fb6270ac55c6eb6bb355ad33bb9cab14760962a7f9119
-
Filesize
10KB
MD50846835f56787a65c33d6e6ec31dd521
SHA1424766e3e90ff72a19ccfc6384663307b2b860e0
SHA2566da2d7a0cb50993012279687004d3011c699a247a7d1a4c0b842e33e3bb12390
SHA512f63672474007624df5d6411770ce9dc247b1dff66d580725bccb87d3b3f6393e38f8b784c69f83349993a60a3b20442b5aac35609a9c2e6732fc2ef981e94693