Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 13:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://banruralbancavirtualgt.biz.site/
Resource
win10v2004-20231020-en
General
-
Target
https://banruralbancavirtualgt.biz.site/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 1624 msedge.exe 1624 msedge.exe 3516 identity_helper.exe 3516 identity_helper.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3160 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2280 1624 msedge.exe 26 PID 1624 wrote to memory of 2280 1624 msedge.exe 26 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2076 1624 msedge.exe 90 PID 1624 wrote to memory of 2752 1624 msedge.exe 89 PID 1624 wrote to memory of 2752 1624 msedge.exe 89 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91 PID 1624 wrote to memory of 2616 1624 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://banruralbancavirtualgt.biz.site/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffa501546f8,0x7ffa50154708,0x7ffa501547182⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2115276405604939047,11025069458278094031,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2188
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51a4db5dc462a820de82072c59a4b3189
SHA15f47e86c5445ecafc2842bebccbd821b8b06bd18
SHA25658278b8a71a433a587d63e9f9d90add8d86a8f1704e3c3272417198f177019e0
SHA51207c52af43bb8f31a13431ac752a9315efafbc5b9c7eefa9dbb0a439cae0a44f957393a415463d17b07d31901987feed18d8b2e0597117bf4e28b95593567287a
-
Filesize
524B
MD5510fbe3319692c626e84c497ee87dde7
SHA15d17c6ffb95063dce802cc02e909b0d4f9e56aad
SHA2560106153f40a439bc1c82161ec8976a740f6f22b8c59e22cdcd754486a92bc6e9
SHA512fa1af63a16cc1ff3c5b535edac080c13ecbb1632d053ff0cb8d1177bb650c9704a33cb285426c9222d2f1dca0989e466bb7ea6f8c377df203ab9b4198d46842d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD535146e6f2a8122d723252ded75b9838a
SHA12a8ac004c2b38898ebf5662b8d218392a3522adf
SHA256e061c651d2e451b8668a4e115fd66e881ee5ea5a2e51040891c8e1f60182068c
SHA5120b033f8a634b4d5eff4b7aff6e7f16f7e9f4452f622d7b6339ae685452fde63bbcc70056df8bd51da4bb6767b1e0948a7ae7c8f001cab54d8c079a05f9c60f22
-
Filesize
5KB
MD512860ee883654f378bbad5d6bf5d72e0
SHA1057381d11735d13b5b4bb6b495f25fc19ba06e52
SHA256c6d509efac650374b9907632e3c543e1c73d0419717c267d77e871e30128a078
SHA512a5a75d333f73b5ee6a91bd88d1621116e6ec599c07732b72490b71d5b385a7f11f5267d0091839dff38e03d93ae75ed243d45d4c43fc0c7e4aa9cfed24c096b9
-
Filesize
6KB
MD53e5a54bfde2fe3db0c5962217ceb1973
SHA1c80e8aedd7be186fd5217485a5e40b23d443d76c
SHA2564808a367ff0e4700bdc63cf713ee0a33217e18aac7e34117d8563770c76b72f6
SHA5128e0d3706e1c87e8bfe089201256611cb66641180f19356e2743594b1991b149e6e0ce1622e6f438aa801f654722654dbd0abb43021fbfcdb09b3720ba61a50f5
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
372B
MD589a8eab14ee75d9324d86d5064d928b3
SHA1b212c9527aa52dc824c6f6edb1747e8e9bdfb73e
SHA256af70c05cbc10ab3cd764c29305c13e561fef22b6073a44ad3ad5e8923a962849
SHA51239c91bcba718aa8216352ff1aed028fafb41cdc60e3e70d7720c3ef7b7ed42cc5caed60b5c23604be79f21934547fe47646da3631f017a8dc960bb63468d6253
-
Filesize
372B
MD590e013dc24c656561d8595da678d1739
SHA10335403472aba535f38eeb68edb0bccd843f0195
SHA256261894eb02630a557571983f658cee8dc1177a740b5f131125f17545e0e35587
SHA5121bd2a279031af7c1da2f44200ed39b6eb65939d969ab381c2813369dbf49c1b3bd155f36aa8b5dc0340e8dedef320b5867ae3ff9640caacf4837bafd70997256
-
Filesize
372B
MD55d86015c4c28ef9f2e0a0a278689fa17
SHA166145f1b1a41b5130f1711e2f40d3815d00efc5f
SHA256e7b80ac8c2ca50606b72924c16a24404c61315c53a104d23d72ffe1d6fd1dfed
SHA5129f6909499deb393e4d9d10979462b28ab915722f724f6a363484d17eb1a8bae6b99d0d2fde65756409b583e4fa3f34addc0fd9c4da1489ba4b3888a1ed6c0a9e
-
Filesize
372B
MD520b94d7e3347807ff8bfb7cb5266a06a
SHA1b4cb69cc2ca274a6af006f55e451a4ea54c34b1f
SHA256a40a9d1a306c8d43c88b20cead89712444557e5e1ac99d80e672fe1a5a37819b
SHA512ce0d129deb73ba696f3a093a7f6c63840812b52e48f7d4e8c714b001c29f0255dc52e5e613b654a0060b8339f1e7a1d268f0fb50ecca0b4436dbe2d82dd0a91c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55c6390994949e88b27e4388e16ede9bb
SHA13d077ddb0e2b3ad9776f75a42c95037d50df9d79
SHA256654e196c13f34295e2c13c8d30603637dab3804475f65cccd52d4e9a12a85549
SHA51252f58ce2c9340869da2eadb15b9cb792aff37a6ae343549f219166c3201fc68e7e74a10948c90bc19ee577d6b45050246b39d24d605d2a1bec14e2c0a6f94f33