Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 03:54
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral1/files/0x000600000002308b-47.dat family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x000600000002308b-47.dat disable_win_def -
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 445067.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 2992 msedge.exe 2992 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 4196 2992 msedge.exe 85 PID 2992 wrote to memory of 4196 2992 msedge.exe 85 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 5076 2992 msedge.exe 89 PID 2992 wrote to memory of 4080 2992 msedge.exe 87 PID 2992 wrote to memory of 4080 2992 msedge.exe 87 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88 PID 2992 wrote to memory of 5012 2992 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stor-1.anofile.net/downloads/67jvqvjt5klemypmcsac7ixxcmm2uoijswgdo7gwua6ybgweue5wd6jyfplwpat2kmrp5enf/%E1%BA%BAasX.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8a8b46f8,0x7ffc8a8b4708,0x7ffc8a8b47182⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16704866674054612430,8474059081190675464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ea74a171714079326bef67b1302296c6
SHA14d65593a9b7b5183170210f77ae8f04e14f16252
SHA25648eae6ea33e1d87935e732f508b07ab31fd2e219a0e503092065e54c79195de5
SHA512a62839e52f7ff6d2237a1d9e982443b0c1c6c1e93b0f1cf65a15f92b8e575fbc22d36742ebecd98139a05fccea546e68ea797fff15c560200bff9ae9f2d9bd5c
-
Filesize
5KB
MD5390a84789b6b4cbdadf9614537abd5e5
SHA10177cb0f7bc859e6f5444272ecc198d3de206bd3
SHA25641382d23ad42ac71c6e70d6c0140d6429fc767c78adeee5e17fd8cb3f3921360
SHA512bf6c6c8a29cb71a074973c567ff09903cb001bf0781a25111f35bc2c1aff41cd97d450820f86a70cc7250b2998f5c867537c31fa998bafde4e20afff012af5b9
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54549d97fcecbec23aa211eb0c0035980
SHA12c04865b8eabd22a813d2e83dca27c16ebf3a4ad
SHA256b7b46881ad1ecf7b8533e54ceb4494ad2a48895cb7c4de553a531a62094762cd
SHA512000bee94aca6c4657e024bb6dec1d4360aab68735f730cdcc47550e6ef913ce337d8d5bf1381b344c85074cb61e79709b2c51b75d2caa35a3efdaddd797a8c1a
-
Filesize
10KB
MD5ae297f24479fa58b47f63a35929a5d05
SHA1b1343cb241b9eb5cf4a596c11e81dc2b9f9c0df4
SHA2564aa9ed8185f4dce8bd00f6eba2ba5e048e401584cdf70fe3c8f20c3c72b315ec
SHA5122fe4315dbc52dca78c558f1b8b6abc88930c7ed4c92e3ba0df239585feb88c269c504a1b45829039f50c7a59f3e6769a558c01b9aad55c0fea89fc1742dc542f
-
Filesize
10KB
MD5e8ba573e90d6a89bb4445b9ebc60c065
SHA138990315fc2e13fded7ba31f7e3f524b10cf5e51
SHA25618b41997ca3f97c3896c2ebd4dc89f7fbad564f5dc10679fc31bcbdebe0b25fd
SHA5126111a3c5c987a718127eb2ab189859de6f892d15d4d628c45deb2f8953a3245804365287c2c2467458849fa9bb40eb042137221078f809c86402562a4d159c69
-
Filesize
75KB
MD58ce1041cce94737d4a36dbad504f4a78
SHA1c4a49dcf6c6edff26b0514da03b155f2ac418a3c
SHA256a7758f03d40f51f6c0b3f84e40fb7e5ae468fd315d6c4ea2b67b664d347fc98b
SHA512bd694408ac0a128028557c4f77b82e4d581c3ddb4326804de0dd1e5547d9f5287f219ef3af92394e70d377e08e4f49d4530acb1941fdc090856b6e4d2bdfc162