Analysis
-
max time kernel
961s -
max time network
969s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 17:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.20.219.77
Resource
win10v2004-20231020-en
General
-
Target
http://104.20.219.77
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 880 msedge.exe 880 msedge.exe 2080 identity_helper.exe 2080 identity_helper.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 368 880 msedge.exe 81 PID 880 wrote to memory of 368 880 msedge.exe 81 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 3800 880 msedge.exe 82 PID 880 wrote to memory of 2964 880 msedge.exe 84 PID 880 wrote to memory of 2964 880 msedge.exe 84 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83 PID 880 wrote to memory of 2288 880 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://104.20.219.771⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9474746f8,0x7ff947474708,0x7ff9474747182⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3245063797186917234,408225211902066970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c0168efbb077a0ae9c70928eb9abdb50
SHA1c25014d65c561a440dd67b427108e2f8a3871d1b
SHA256bd74a055a523af5002e53ad2b978d86eff5253c6086d2523e4254ac28c7a9155
SHA512c37cf313d6b4e3f1edef7f42a36a7774e1417bc50d66da988ff095420e41a264758de3c42dce750fa5f32cf9aa261701aa8ba27ca95362b905807efda4449968
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\25d0ed31-ddc8-4ec7-a5ae-f63f73526b62.tmp
Filesize5KB
MD5d516006c7f30bd21033d2f9f09208bfe
SHA1a98f4754305092bdb38bf767e17cc9ac958352e4
SHA256648132afe3ff38669770a0799f803def2204d1a71f16eee4e55c8924825f87e6
SHA512714cf195c3f775badfa165da04b262d508342cceb85025c380084916f0464fd45eb4aaccd521a9184ae5bccf61d1f1deeb69ffec8199f1bedf1620f8891a67b5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5cfce73c02d2621efac4109685598fc88
SHA1e70e2973fc4b7b41601e09da10e7a16dc789a4b9
SHA25613092833734aee1e793615f7ddbd4cf9023826b2bd809744524af8c65d5af970
SHA512b06a94f604976c5ff44a90659a1c19867ec1198516eeabc3f697706e13dbf12e2e965cd700364fed9a4964f8741fe3d5f4768ca3babc8125c19a9954911e3d5d
-
Filesize
200B
MD5eda1a505f5a961d08b8b3c9dfdc1fde2
SHA10cdf6113be61f837d6a6e3f9901b7bf5600cad07
SHA256107fdd66949da3aa231cc62ba5d6ea77e54995e2a195c8445e63fd5c64be2104
SHA5127ebb79a93da86961bf042475bb3cb861e535114cbc7cfcb6dd580b21ab3626d20fa0e5f7eef11f663fedd8c1e35cb238b8b46b6fbd65073523537be83a761ff0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5bbff048bc472edbd5e09572289816cf4
SHA17849b2625593298a3e005c92adcfbcd28d6804f8
SHA256159d573c0225dc974267eef80510b13cc8b65f8da63dddc1117f585479d81d07
SHA512a464088131d8f79c27fdf6159301fb4f33b103aee007703b74f0e3d4a7d1f98f7660c4b5585f4883a212e45e6b62ad5ccc5d773d617b9b573add900c55ca17d9
-
Filesize
5KB
MD528952ebe4c53a826163f132702d51ffb
SHA1048b59b3ee77fe34da4ff437efacf09833703790
SHA256c102490f1d093ab29b4bea46b8f1c132e9fbce731b5372681f465795472d1154
SHA512c2a96c0906f61c517d2beade0448a82bc55c0468795dccc39a7e1a7ba6bdc038e26d4321f383de63aa22b7b1e8a16c35d60eab20261e7813b9b009420afdfceb
-
Filesize
24KB
MD58ee4a79ad8d8655cdd4ff2fbf9bdaf04
SHA19089d34724211f099e897847e81bff6da819355a
SHA25680075ae79dc3bd60009645ba34c1e708c55c10d6c2326c8fc3867a59a331310d
SHA512f055f8fad719ddbb3a4735b6fb306b1282fd77e805ef3d314be9da0a42cb43010ede4f3ce177565d8d2a16a1880447002d5de2a4aa3e404834b814b01752f9e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5340ccc9328eb621fc1a0484db10820bc
SHA1209490fe270195e4547abd13f51f18ef392cfdef
SHA2562d4920bfdae81ead2c608c556d3db90bed466b99bc85b514aec4758d8120ab24
SHA512870a5b7ab6b2ccaab09290af19fbfac308bb6f0efc83b90b18819d7d3f27b0a0b5fba515638129a600802560c28e35dd2c7d4d8e5a79c2ac3d4ff57c92fad848