Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 10:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eternallybored.org/misc/netcat
Resource
win10v2004-20230915-en
General
-
Target
https://eternallybored.org/misc/netcat
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3756 msedge.exe 3756 msedge.exe 3000 identity_helper.exe 3000 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 3800 3756 msedge.exe 57 PID 3756 wrote to memory of 3800 3756 msedge.exe 57 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 1908 3756 msedge.exe 87 PID 3756 wrote to memory of 3564 3756 msedge.exe 86 PID 3756 wrote to memory of 3564 3756 msedge.exe 86 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88 PID 3756 wrote to memory of 1172 3756 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://eternallybored.org/misc/netcat1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffd13b746f8,0x7ffd13b74708,0x7ffd13b747182⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17401997927435267125,18124786806461736011,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
265B
MD5f5d811cec93bf7e6fe1a1a7d8dca83d8
SHA1eef2c93e7ab679cb606dcee70fb9d24127205c58
SHA2567aa8e0d8b461a79e19a0d51b7e04e11c9cb96832963652bba5068ec4f6a4f9f5
SHA5126edc47e70f1273781972e27773fc2f3a6634a246ed9fedfc8f4d6cdd7f3692931f34c68649311d4be2be203326739245f16e6bfbc165c9ef416790257e75dcc6
-
Filesize
5KB
MD5aac06a74f0f55f274f13c1f14d5d00da
SHA12dabe1a8ecba38dbcd699a091ae64893ec3ff72c
SHA256087c794d2b484b9d70405d582c16d10edf2b04b3ec13779e0bf563fba6ae9786
SHA5127e0dbd6bb3b7784e94b8cc10ca21128647712cfc007a4db9f789f5393a678dc225cc99ef911aaa71ef42415f2f5359a622979547b2fd2c5b793243333c080090
-
Filesize
6KB
MD54e99c53aac04f4e2803ce955e27514b5
SHA1b7555a8684a903770a635c557c5551c959ba75d8
SHA2566a5407ab414ba0f5ea53bfee10f3a2e021f51f7a1fada0be76ef048b0b487802
SHA5126be818fbffee53e2c8ad271689bb3f422ba211f8c1f55963ccd04472e25fdf95335a2fc979153e8569080df04a46961201cceba89bd128501c82ebb073e06403
-
Filesize
5KB
MD5d6bfab95231f5cb7d8124346ba06f09b
SHA1b411c8dcc77394db293e571da50902d9560a5329
SHA256dec34b591274237fc62f7d43f7af2c664da5235dcf434ad1839e66d9f5789e99
SHA512050b7dd1e5156545563fceb05de2fd20b947595ff3e3100156eb33fb9e5e2d08f4d03d4c2d40e075fbb7ce1ebca20014d329fcb19874b24f2a94cb36a2f06a1a
-
Filesize
24KB
MD515ad31a14e9a92d2937174141e80c28d
SHA1b09e8d44c07123754008ba2f9ff4b8d4e332d4e5
SHA256bf983e704839ef295b4c957f1adeee146aaf58f2dbf5b1e2d4b709cec65eccde
SHA512ec744a79ccbfca52357d4f0212e7afd26bc93efd566dd5d861bf0671069ba5cb7e84069e0ea091c73dee57e9de9bb412fb68852281ae9bd84c11a871f5362296
-
Filesize
370B
MD52156d9226b206742f7456106af2c9312
SHA19a1e2dd683e61dcb2c538f26d11b7aba8b89c50b
SHA256afd6e251940075f48b73d39bdfbf530e2cae60deffbda8bf0e60d2c4ee7014cc
SHA512294e8c265175db7da2feb9b7ceb3644c594625f7a2471b2baa39294ad1d074c6b1fc7a4ff17c98571382e773d2326a63bfcaee81dc953e42449dacb5e8b4afea
-
Filesize
370B
MD5e66b2a2eb86a4efae1e0b599de24270e
SHA146789f8ba56075909c6e2b0e24cd990d5416d106
SHA2561ffe428bc1317dfaa32aef2943932094616aeb640ea23988a79176e9285fe870
SHA512543f3ea2558345f7bc59159aefc738379c117b1bf41a04c069a327959b872fd7d1bf699d29ca0d10065e3441a494fe699fcfdc7c1e8684ae5cd4dc75d54284c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD542d0fbfdc6449b5f5aced210d57fe985
SHA1f583db2bea0b37bd60c66224836ba47b51e7fd04
SHA256c30f04ffbaf4dee217916673b3b8aaa316e91ea8a204e520f3cf34711fd7b443
SHA512e39466a6599eae319ca80890ecb538488fcbaba6fe5f5d40381339b04bbc8ba9db2616018b36ebe7a9895756c7b07336c22b6fe83acee21045195a4142e1bd7e
-
Filesize
11KB
MD5294f2ac122838ad3da66a6e04ab1bac1
SHA1c938473b185c220c7cd62c9132c8b2d58495594b
SHA2567e35c24eec27d3248e914bb044fd23e1caef15714cb1bcd130c928af67fc100c
SHA51237b97499322aab41db2ed02ba6de1203e6ebb24b9683e2e84787fc0b799e065234f3cf3588e00f61ac6b1caad39812b5321039ff3cd51544d2c225443cbfb14b