Analysis
-
max time kernel
71s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 07:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://btcusa365.com
Resource
win10v2004-20231020-en
General
-
Target
http://btcusa365.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 388 msedge.exe 388 msedge.exe 4712 msedge.exe 4712 msedge.exe 808 identity_helper.exe 808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1984 4712 msedge.exe 33 PID 4712 wrote to memory of 1984 4712 msedge.exe 33 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 4956 4712 msedge.exe 88 PID 4712 wrote to memory of 388 4712 msedge.exe 89 PID 4712 wrote to memory of 388 4712 msedge.exe 89 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90 PID 4712 wrote to memory of 2752 4712 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://btcusa365.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9461a46f8,0x7ff9461a4708,0x7ff9461a47182⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16539205062832717334,4729540438449067240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a792cdf63794bc6c88eb51f731065569
SHA1c16a9d7695a0b47b087e8989d2cd70887ea7e551
SHA2568b5ff6a23b41059e83fa81a9185346aada3df1df15e3fcbf6e68323713410509
SHA512e41703d05798cec4122ab28737e5c49011eae562c4963fc85ef3616e51b55e661d25ced0f7d075bfe7d6f868806c8eb959a4a0ef261c92e86e2727d5b5397ba7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD589e7946890b954ae7ac4ac9c0e7fc5aa
SHA19b25c844a1a6ee5811200a217ab31e72a4ca73af
SHA2562aebe1007eab8f95c18282ee7712c99f3b01e29f388070413cbb59460c136c2c
SHA512821610283963d665c216a4d0c04e71105f20b55a2f3e6ea0f82da8007d8379e5b0a83ee55b65ae1ceb9bce147c8cce6e66b0d11b93b698e03981c6dfa0947d35
-
Filesize
5KB
MD5c29fd1bbc933d5247807ab7f5382794d
SHA10aa90e744ab26eaf22337d0221bcc33749108554
SHA256792397798f1f5cb1b01cab87d98750ac4ba64c856ebce942165daea5e31e6c2d
SHA5129d4d00f8418df3b97118dc1ba9868b66cb869df302837b314e6fd4d016db6cb4375b468e3263b461f21618c8e2a79b86be0c6de177baf50af94b7cdc98b31a84
-
Filesize
5KB
MD5db0879f08809536fb5db4f83ccd2f890
SHA1a16f15c0e8594867bbcf0ab95b3fe8361d25218e
SHA256e3b6ce80ff5c863268d134e23e5cf713d4905b04b4c0b81b83ce4b2475779629
SHA5125da408a61e32f969a9641e4049659654946355a2da205c2c379d87378bf86c258a81c6b22f18e28ad56afc4f1aeaf4cf36740074bf70dc295880513ba5718e25
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
372B
MD56f080f12ec13951da4f0d7b2320f41a1
SHA193f31a7cb99e46bd83559141c8cc59cf78980616
SHA2560ab7b9a33a1108188d46723ccfcb17a9dcf992ba2dbc687a09bff507d0421924
SHA51243aeec1a1229ab15003a1f79d5a099670ec52de0373675970739567fc1b97b5b45d4b5577a428d749f9f26df9d885e53696e6a7538bb6c34dd86063d493abf96
-
Filesize
372B
MD5159fd9ae9726797380682a17327771f0
SHA1eb0279e2c035e702e07705975953dbfce565e85a
SHA2560edbb5488ee9495effc17fdaf647ac82e2be9aadd8794bc06b211053c320923f
SHA512dd73e51ef36ff0fc5c3961de2adc779e8c282ed06957227fde0f807f76d9d37586383a676cae2d8b96a4cf60e61d323e7145b9b1c3a592c1831f626e3625ee91
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c942a3354e415cb96754feaf6daca991
SHA1ddb621965b1400777d8e1c978210238c9eec0fe0
SHA2562070ed6e39921ca3821699af13549eb6215aa6004d983875bfe79a3feaddd90a
SHA5122395abc000eac4af1d5d77f9c4fa68b6a5fcb74cba65f57dc74ebf2042321dbeb7ffd34f2049cd4a56ed0268c8edd225a44d317448a27d76febccc3cbbba7f63
-
Filesize
10KB
MD547cddf25967e038ab49d1b635b9b9c3f
SHA1d1eaee05caf700a3685b17cf36e6e6cb504b88c5
SHA256662cc15c4003aff97ebbf6b55bcafa82919a993dfa10cecfcd48974b6b11de80
SHA512ea08d283dd32d3a1fa573b58ec4f0fdee5b5727cdc1985eb73b2a4e33de308f515cdd5ed2881159ce6a9e07190484479389f67d8faf4a1e3604d1714377a6385