Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 03:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bruraltop.jimdofree.com/
Resource
win10v2004-20230915-en
General
-
Target
https://bruraltop.jimdofree.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4380 msedge.exe 4380 msedge.exe 3936 identity_helper.exe 3936 identity_helper.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1660 4380 msedge.exe 87 PID 4380 wrote to memory of 1660 4380 msedge.exe 87 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 3248 4380 msedge.exe 89 PID 4380 wrote to memory of 4992 4380 msedge.exe 90 PID 4380 wrote to memory of 4992 4380 msedge.exe 90 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91 PID 4380 wrote to memory of 3500 4380 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bruraltop.jimdofree.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffdd76546f8,0x7ffdd7654708,0x7ffdd76547182⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,14662357639758073344,1997924626654921048,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD58757ffe5b899514feb87125483a2db6d
SHA1ad98b73cc7cf87fa612fe41fb3db1c312f6654fe
SHA256b7e79f7daefa98b4ba10dbc4faa0324eee7127d82194ccfed57649f08b33aade
SHA512df975284a0dece94ad5b843db270b3af73512195671f59524c6f90b176e0960f6977f02eaea730298371a0fce84d92d1af3049a5a63d35e21719c72e4ce46926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5a77cdc40da7da8370ce7d472d95913c7
SHA16fbb1b1ae5c1afe1a46c438d051f0ca0a8af5d05
SHA25682d005b9dd66ef6413ea8b0851461496f16b8ea962c332c45ce30fab564c1ce7
SHA512a2dc8e90c4bb0d606bd465b6dad7eecc3933f7b3eed662b9fe6acff4bd77b972552f008d1d1305f44ae21d306c77253617f6d318c2f396c799c51a7de3a4b70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD59d14b52b0ac596fcbb0d9b24d9b810b9
SHA12e722e9852f14aaae896599bf52593c25d97c405
SHA2565bd72c0154494b479228333e599f996e4d57eb13ecda8a811b55e2b05a58fa2b
SHA51200ec702a779109556a27e85d68d3a024668dc9befa2a45a037599c104aa88135322504b5f1b55f28d3e09ed95c49979789793d67641ad5d9f403e91ceb4e2a55
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5bb4a9604c13de180b2121295931e3960
SHA1fa3d0bf05f34ca51331b4369e61c6b2256401be1
SHA256a8a14c6fba39c5095af4ed18a004b2677e989003f422cf704b82b93ba9cec202
SHA512ca43685263cb1610dbbf36af918f04d96bbcc0cc9c7de120ea676da32c36f92f81cd8d5834cee58d05d2720385c3e74c48a7412068e443e2b65ceb18edd49bc1
-
Filesize
335B
MD5f04583126c6659b6a9250cfa6c037a02
SHA11a0e67a7aa3d26fbbea761ad9045888f316b9509
SHA256f91e70a2a6f5a2b16dd66f3cd3da776b97fadc099fa7c8e153537ace346c2426
SHA512566f4041210581b19c7136d1555dbed2749f7f86f55199755167e4dbd9e2603bbfc56a179c78023d2aa21b3ab8c1816d015a58c500582bf6dc8c239827b20ac0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD567b493cde2c1a1080c671ad3b93e812c
SHA1762159666bdc2e4d11bbe864ebcb5a85a74500e6
SHA25602064a993043e30d8036cf253014dfbfaf1a2af237d758c117a5e9190c77866c
SHA5121d560b997b5fdc813d7588197b4fe197c78edbd0d9d4d9c60cc0eabb869650f2df01037af6deb19c8cf95b8b84a84e10ab679c76e466097348545729d286a329
-
Filesize
5KB
MD59e6158b3b75827ee3750db7921b5adda
SHA12491ddda5e4a4ab3f560a5c9f17d63f4ec177fa8
SHA25645bd947f024674949134a8a3b6727ef6d5cf4c22485feba05240aa4d091818da
SHA512f74f87cbabb5fa061093cbc7113ca53ab71500be71b59ddf44da0c173c6ae33c391dcbfcc3c11617a32ff7daff157dd393193d299fb524167c2e970c99b99f87
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5466ad3d28130a0436381460ba4a8c600
SHA1da5b4ad466ea3fe689c8d062fdee2f6aa55da9ab
SHA25669b605f42879dceba6b67424e5be943e738d87d4dbe8894fcfee020276b5b2ff
SHA512154056838a380068e05c03130b4270ce2b7852f44ba397e15f38b38731f9ef3de6246d79cee0108f1590f847d5645ae848cd2fb1f1e98de14bf32e1592c73730