Analysis
-
max time kernel
148s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 10:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://client.handyhost.ru/manager/billmgr
Resource
win10v2004-20230915-en
General
-
Target
http://client.handyhost.ru/manager/billmgr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 1228 msedge.exe 1228 msedge.exe 4308 identity_helper.exe 4308 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 5036 1228 msedge.exe 70 PID 1228 wrote to memory of 5036 1228 msedge.exe 70 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4456 1228 msedge.exe 88 PID 1228 wrote to memory of 4460 1228 msedge.exe 89 PID 1228 wrote to memory of 4460 1228 msedge.exe 89 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90 PID 1228 wrote to memory of 2296 1228 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://client.handyhost.ru/manager/billmgr1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfee846f8,0x7ffdfee84708,0x7ffdfee847182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 /prefetch:82⤵PID:508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1524707854887259329,18156826729697502916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
181KB
MD57d0523c8f2a44a194de34bd42be8beee
SHA1f46afa868fcfe7c189da86e69b3f3468aab47e39
SHA2566191b5ea83557ff03488f2d3c2aff3d73a6360521c8eaf5f4747db9809df81c9
SHA51218e0dbac8f74153a31b0a96fcca65bf3ae7398e1a4a59a5900ef1fffc1220e702c3e1ff11dd7e994f5432a0f89ca454b89838791affe45ce50034971a43a1c22
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD518dad5611cb9ff468570711fde710d29
SHA1bd3db505797d9b4d3f66a6ecbbbe250ea0f7adbb
SHA2565202e9db4c52cb7510d246f3d8e87d45fd5813b09287bea5d63feeca59ea978b
SHA512dc64c602585cded9d0f5058c2746d3969775c6b352225af3f13f49f5ce172dc185709db598c2366f238ac6db8868d204eba7ecab1136a25fdf360235217fbedd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
883B
MD5c275920aee6ef4b86aac36184220a011
SHA18807b1ec0597fdbc6c850d453da3454d0ef59edd
SHA2561f3ccdb015bff31319ab1ecf705f497869cca532f90bbbadbcccf6688b696285
SHA512077c6874cc27f2fd115538fc8be6fe2d3f380595462230b89af57afc5aa10c7ac1f3f3897a31a949ede08c0e5debe2157ba6db55080feedc0980db75d705a549
-
Filesize
5KB
MD5a31c85bb8a611337c8499e68ca0f5897
SHA157ef1a89f8c77ae60e760cf0753303cd302eed2b
SHA25665bf8d6251d16ebd012b1b87c8e04b6e75a0ea066f55a40eed4ad3eb43dabc18
SHA5124cc4bf4416de328991ad637c7581884b0e51909f0d9775b4c75319add54e441c9225cc6cab3d2fb948088a2ee4c1424cd7858b13ad9d43cd0afc480fd77184e1
-
Filesize
7KB
MD56931e01190deade9a957291140af951e
SHA14225d3f3160ca19fdb6a4f598d02f3a82184c203
SHA256779c404993eb3100bcee099533543fa784e84fc26557808e028e6883975b8e34
SHA512c30011b8933ee31359c4b0e937f570f5bcead1d6ca632c635d7efe33e6a5eaed4fe60344cf824b42c2f3ebd5748d29a13c9607bf5c5555660e2e60a632bb1984
-
Filesize
24KB
MD501808655c624e1752acc157b88d0dc51
SHA11d998842efa5b71d79ee050b64e2ac70e75bd130
SHA25642532506988d749f210bc44b3cb2adf33458116d46d336870933d8711ba87039
SHA51215df0fe0d702a8d41fdbe95f4d651700f1cb0011ae2501a84e3cbfe17618155f6705636d963b8014f4b16bc1bb835f75f0bc8b098403ec3b64b53327e6a0c0a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a6734df10b7dc0834a3c51b7ac3af783
SHA10c74c7caedc40ce5ffcdb40be86a9eaf4df3714a
SHA2560651a12a5edb1901e1dc16dba4a7fc711e1035ebc8bba2c0811e1b8e3a2eda17
SHA512f78765eb6f8b5cfbf3557b901986f051b2988754b965ff9849e0da55b6526397b9f3b59c38bcc751b19074d636f8c3700abdb10c415e486c8b88718f49079324