Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 06:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gm.kiha21.or.kr/R2.aspx?s=7606391
Resource
win10v2004-20231023-en
General
-
Target
https://gm.kiha21.or.kr/R2.aspx?s=7606391
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 3592 msedge.exe 3592 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3840 3592 msedge.exe 49 PID 3592 wrote to memory of 3840 3592 msedge.exe 49 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4632 3592 msedge.exe 91 PID 3592 wrote to memory of 4976 3592 msedge.exe 89 PID 3592 wrote to memory of 4976 3592 msedge.exe 89 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90 PID 3592 wrote to memory of 3408 3592 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gm.kiha21.or.kr/R2.aspx?s=76063911⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffedb746f8,0x7fffedb74708,0x7fffedb747182⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,3427508875737109150,2949709472516855700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
71KB
MD524768e635dc3eec71947f76526c6aa3f
SHA11b5e5361ad4cef6b10882256fa1595de94efd324
SHA2560c0d81ce0450324219dfa7976f7d6c9204ada3514755309edb2012440638511d
SHA512177bcffd9e2841b9c27462280c017188fb5d192e5b585f52a59550e1618106907c337dc136d8b26a48a68db34c159bfc212f6f2797b957fc593c852bbaef1aed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5eae93eb2fa34a786d341aa104f2ba9fc
SHA1918e18cb7de51aa070f7d84618b9a296ee3ec46b
SHA25660e1e99ea42ad203e6d87ba59effa68e52c7f41fe3816df599c1e579327bdcba
SHA512733e6234e086694841e3fc01f4d9e4788e5284cbdf616453a25881e0435efd6699b86a91408e56ae98cff77d08978074283e23aeb403de9efd734e77a656e342
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD596bbb803e86f573847301dbeb51164c5
SHA1b16d9b288026f12ca1135787a492b304bd36967b
SHA2560255299fad4f961eb1637d61dcfd899444f793753072841cbd3b3a3121e7a5b7
SHA5127a385416acb61707f8c414727f7411521c0135263f8f5da8e1ee9af67a992f34c90ef0cef833672bfd3c1ad90b323cc72b374958cc19083523d4f0be94369205
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56d1a3ee6d839ce9acd60da5f54082455
SHA17c2d03a6d5f8fdaa2e3b02b2be1880cf34de7b9d
SHA256e80ebae8c8ede254318baf2283fb2cfa5a9a4858d2720de11580b84c06efe4a1
SHA5124c6a867e78a2c62fa2fdfa57fffa01cd01321f8016aa745e10cb4a052a5355c2063fdb541da6a30500394bd79a67934680aca0472d9562ecd91fef58d52daf41
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5692a6747ddcdbc330fcbc2c7afcd22c9
SHA1d1f4916d8c8abd7fd8c131f43d5385dcd62a8c4c
SHA256329dcf73e0d335c7da343cf023431966ff562e1cb922caa3a19f32c80d2131b6
SHA512604e109fa22e2800c6b26bfa490340052d878b364758f1dd0da813c5fdcb4d9b5592781018a5bba8986942b02ab422095328483da46f08e00610696bbad886be
-
Filesize
5KB
MD5bdef8f05c8067c82a8d38ada24ffd631
SHA1b142da87aa3e0eed771b52496788f1d995065596
SHA25659632ccb09758b2457c3242ab390e22bb0dfc81f7ed4597edf5274f1ed5c09f3
SHA51288637ab0b63065801801c87049cb0d4f37836b57a50698b6111ae3ee15e05d37d8a0a93371da3a090c0cbc5dd0511945ae7ac65d0b4b384afc4a2b2ad6c888aa
-
Filesize
5KB
MD52edac8249dcc335cab15aacca8d8fbba
SHA13f544f8c4b6c4e25c0af6992a22754f320f1e982
SHA2563fa5ec8c640b944f9592edf451c66498602e5344a28bb0cb67a26df5a5ed2172
SHA512b53d9e519cc88c8ec3cdae9952843432f9071bf747b4196f8e606040328e04fad3a9d62ca41f87d5c9892c64951d6cfc03d3b767995db079d9d4544b76912561
-
Filesize
5KB
MD57aedb00cb103a6929667f60e0f46a4df
SHA14a610616db5f9f602a59d0d59e8326c4566558da
SHA256f0e9fcef1ff8aeecfd51c9e2763d215f15db63cfc60b15f7070ba3c1284c7116
SHA51256aeb6170af55ef02401687b8d4dfa40582421f285b5b0b8b9f3a0aeed58dbea10dc29f55bfc1a8d3e23d7789c8635cfbd7ba2b636248fa2b3a22b580a19f834
-
Filesize
6KB
MD50fe000e0c9689be821c038fccc3341a5
SHA13158b2f67ad4fda25134d3937e97113c8f257edc
SHA256010d2cbde9043839b841a80fc141ab296c534edee9026fbd4c95489100d6ca00
SHA512508a5c1e8307100fc0087d8ff48c618d20bfa23d37379f4f7324205e9009685fa718c69069099579c66b8f683cf60a176e9ad9d9e1c4eaa010ccbb99efdae32a
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59bd163c448bb17b4dd7f78183483855f
SHA1c1f6593e5fbf2a6174749d14513d89d0476af891
SHA25626de45de325f8172f90288eca32d7a0b61ce3520b5e4bb74c0c5fc18efda5c73
SHA5126922ec0cb96ff0645bdd8c1660a7bd4d8d70289c699c30d54ea5f018426396f8c0b3c4d2999ab6156ee0fedf93f681f017ce1cac77355dc7b78b0a6aa198a86d
-
Filesize
10KB
MD58c9c07cf0b815c4f2fb1e47c3bec3298
SHA1ba641d1f5a086f2dc2ba80a77f92a1a74c13bcc1
SHA25679ac657e4ff39c3f99aaecd136da5b3833243a2e542be039eb51977b11c75073
SHA512d51970a6734e215c136ef6247dd59767fcb7844eabf9bf8e27b9c62266df1a4c2a7e8939f80b562dffb173e04caeb4a7857b01f1d6a58429f99ab3eecdf8d0ac