Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2023 08:46
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://musycas.com/ess/apiess/c2hhcm9uLm93ZW5Adm9sdm8uY29t
Resource
win10v2004-20231023-en
General
-
Target
https://musycas.com/ess/apiess/c2hhcm9uLm93ZW5Adm9sdm8uY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 500 msedge.exe 500 msedge.exe 1892 identity_helper.exe 1892 identity_helper.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe 500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 500 wrote to memory of 1564 500 msedge.exe 85 PID 500 wrote to memory of 1564 500 msedge.exe 85 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 396 500 msedge.exe 88 PID 500 wrote to memory of 1012 500 msedge.exe 86 PID 500 wrote to memory of 1012 500 msedge.exe 86 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87 PID 500 wrote to memory of 796 500 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://musycas.com/ess/apiess/c2hhcm9uLm93ZW5Adm9sdm8uY29t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85ac146f8,0x7ff85ac14708,0x7ff85ac147182⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8941759805108545322,876037101407904072,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
547B
MD55352ab577b0031670ea3cb434553f12a
SHA1c139beb0f1bfae6581744818735c9eb7fa67a703
SHA256c4798b085e8a863334443e2b3bc838a4b6df1cb304c9f1f4d934b0e34e393a6b
SHA5125d145f7f33185f620c8816b88cbcb335a6d289cc6edb66c72a51def0b5909f1f264aedeea8a5c46fd3fa280f656dda342af5709c2936f189d80082c88d66508e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5bfe576b297b9d150d8776c32dea2b1e1
SHA1400d1c95e04e5d4d15524ea38feea509cfa524f6
SHA256739e36767e4ecced9606671e758397d64221170e4c7b2fbc40fa3d32dc3642c9
SHA51202209500d65935bd4aa760d1dd32d06dcdc4bdc7770b8262c1fbc0f5433e4fe7b25063fba67bc40066fea9621eac34e969ff345c2c3576211d76905ce5de0920
-
Filesize
5KB
MD566adaebbb39016bccd6958f191108c09
SHA1be03617700095181689ce1ae36486ed0fac6b328
SHA2562195a1a0928e4da023b22be3748f6ff0b135cb004a35738b4b34f4fff2717f7d
SHA5128b3f1481349d1270fa8546dabfb09578faa1028a88f386e4e9e2deddc53be7638871da334dc16dd7cf1f0dc59941ef9009d9592aaf051545ac4e0f15d9d84663
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593322c62be963e2965808a44704be426
SHA1e1cf860b7275473a735fc074d0f5d19ef407b774
SHA2567a7bca3a8f07887f352340c3fd65e6f59a2dd8cffa3916acb4789ed1d6164b90
SHA5124157750bc875c8f73910995a8833b6525893ff843224761703888582116ef5fcdee80f8727fb810b52aa533469ae2b7abde08ac40caeb1551ef17e627066e7a7
-
Filesize
11KB
MD5d56895f291e137858da502c5c6a10c8b
SHA18b53846e495750d007e8a3c4779441a0a06e69b7
SHA2566f8639bf8f82194babc44ae6d9eaf4c3e5945c6cceef0157a77a7d5f59c6f116
SHA51248a6d9be8cc25b10bd59f7bbf0abe1e57aa32731fa4780825d84bb92f62a89b6f3acc498fa3766ef1eebb5db46a39b261040e41f41fb69213f7f6b95d8986282