Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 05:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://auat0astg0v.cc
Resource
win10v2004-20230915-en
General
-
Target
http://auat0astg0v.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 2204 msedge.exe 2204 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3632 2204 msedge.exe 27 PID 2204 wrote to memory of 3632 2204 msedge.exe 27 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4000 2204 msedge.exe 87 PID 2204 wrote to memory of 4324 2204 msedge.exe 88 PID 2204 wrote to memory of 4324 2204 msedge.exe 88 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89 PID 2204 wrote to memory of 4384 2204 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://auat0astg0v.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ca8a46f8,0x7ff9ca8a4708,0x7ff9ca8a47182⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3101612698472075866,10358589804354768454,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55fe9995d9f75f242ce35211e2887851c
SHA1a8deea79c50b2b986bc3e699de889d716d1034b9
SHA256cd258b9a623423619297a94116465805be40364183c29441459eada8b4d06448
SHA5128cbd999f4685aadef7149dcf15bdb8a2e74572e926cf903d5829c9eebba23b6a4ba1ff8c5ad643676c02020d69e85b5ec5cc384d40fa7d437ea23351c974c611
-
Filesize
555B
MD5198ab65cbdfc282fa8137f13141c26b8
SHA1fd3be92182bff2e635cd0d81ca2c4a5be2a618a6
SHA25600a9497283dc96b92b51b0b6dc3ab3bf09f31200d23384f705e3ceba95ffff64
SHA512f7b808f5e5d6541689cebf9a92c2880bf8075179fdc85abaa90c4550afe95d40c0704b7ffeb8f2f2e3174adff3e860ec78d06dbc619f2c117435635b836e979b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d2c24241710fd445c78c034a12214e0c
SHA18bed1dc828327cd6d31245294bdaf290566cf1ce
SHA256f8fbad5ed8c7e4875192e8e29f24b870ace19fda78545f88feafe089db1a108b
SHA51269f843e2e1398b3507ff2481ce5c0c259339de7a0ce9bdaa134b69da4c739eaba68c8fbdaf367dc2151119bb7d74b38de2c600ff75d52098b3f58f19e80b1d3f
-
Filesize
5KB
MD5605ac8a9ab2946a79cad80adc07aa94a
SHA14264fedbc0f36d2ff70917b6fe107873f6b52dce
SHA2564f27d72ac3396367825062dc405e97c29de4a9dbcd41c3725742e7285df7155b
SHA512249e6d22e8220d75b2ad3aadbc800b693434aadd2921e0b2796410c988e3823c3a0ef4bd30f9be7bd35e62b9b8e4e3cdfc9257f2021c09908941d2e0909e9293
-
Filesize
5KB
MD502cda74f5f073ad777e982ecf6ac03c7
SHA1003d99bbae5ee4f3c3afd5d3de349e7cb6cd143c
SHA256925e9fd28bd0c92fff602d86ce2bc60f7cecb9378dbaba02f8a29252c8d4ec9c
SHA51289f888824ec5c0c49081f0f939c5e025952587eb5f34e694e454956812e664bc426ae33acdb65683b88329ff89a56031f25c395a875e7971d01da94f43a80cc3
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582a654fc61f8f2756dbf5c313f36333c
SHA108497148aeadcf1182608c8ac3c53c631cf21915
SHA2560ef1a2c2e66def99ec9d87a1b6f117eb1bbfcde4a6a3d38d5d1a90c712db9cd1
SHA512438ee295d3af6d064834ae011356ab056040f3ed4141adfca960502923a67fecdea9e301f686266e73d0c9c78b4a48ab96696aecb931309d855d57121167ece1