Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 22:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://amaurotic-picknicker-810dc3797a28.herokuapp.com/+?y=49ii4eh26oqj2p1gcdhj8cb3clijadhg60o32cpi6lijiph2
Resource
win10v2004-20230915-en
General
-
Target
https://amaurotic-picknicker-810dc3797a28.herokuapp.com/+?y=49ii4eh26oqj2p1gcdhj8cb3clijadhg60o32cpi6lijiph2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 2884 msedge.exe 2884 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 4664 2884 msedge.exe 55 PID 2884 wrote to memory of 4664 2884 msedge.exe 55 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4068 2884 msedge.exe 86 PID 2884 wrote to memory of 4692 2884 msedge.exe 87 PID 2884 wrote to memory of 4692 2884 msedge.exe 87 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88 PID 2884 wrote to memory of 3712 2884 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://amaurotic-picknicker-810dc3797a28.herokuapp.com/+?y=49ii4eh26oqj2p1gcdhj8cb3clijadhg60o32cpi6lijiph21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbea0246f8,0x7ffbea024708,0x7ffbea0247182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3076401596873817683,11784892295915421903,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
308B
MD5cc84d11226ad24040e964455b4846f1d
SHA1d6a86d5747bca9c8a9b1806f2ca3bc2000b82c64
SHA2564bd5e0b20f24198b9c246d51e9842b8eefdd6c0ce95b660943dd0e87cccae7a8
SHA5125203b1ded3717276efe4a723107beb5bcf3abc6c4da0b99e8dc71ef6e557683c6a8caa9e5b10a51ca89d4ad24488c6b80a4778d44147a751a32fc11d21e34916
-
Filesize
5KB
MD5827f33c58df29bdc21d422b52a37c380
SHA1622462e824ea2cb843b6ec71a2024983e5dfc1e0
SHA2560b67807658b93ebc7c3d6a7e5279eec1f7047e167e02a7438c70a148b0e20582
SHA512b86eaa507a1bd6cf1821966c1926da9ab3e2e602916b366fa9733f2ccdda4ebe3c6e8221cb9a757659e101417b06401646aa431e1ecb6156bfd04a71f1a98943
-
Filesize
5KB
MD50de92894c4dec5fc0644dbb6f94dd54a
SHA120a7eef1979063b48a97585614882c4b7a5d470f
SHA256dc4b541ed7660569473b745835897b511f49bf38cc80f0bb9e7e46b32e17189f
SHA51259fc26391864138a6c44be3fac6d07f42b54106381d3392ae7738c89721520630dff332ad8462b0731756cecf78514a53d80519766cf79d4e7c90d0ee890e666
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD512e450c8c98965fae12f39a0a296c7f9
SHA1164e9607275ddf685fbe7dce367ba9243033247b
SHA256ee6e00e4549a526be15f25ab8d72b4a675dbd690319710043b1656c48ed77953
SHA512c689a790a2e151240424f890d53ea5eaee8252bba1b4c6aaeb958e4b079d01f179d52a2aaf45a5d459da201fbc6ff1f0fe0d678c946c2096d50178d0ec645b4a