Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 16:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getitshops.com/Barural/
Resource
win10v2004-20231023-en
General
-
Target
https://getitshops.com/Barural/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 1928 msedge.exe 1928 msedge.exe 4788 identity_helper.exe 4788 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3956 1928 msedge.exe 57 PID 1928 wrote to memory of 3956 1928 msedge.exe 57 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 2624 1928 msedge.exe 87 PID 1928 wrote to memory of 4596 1928 msedge.exe 85 PID 1928 wrote to memory of 4596 1928 msedge.exe 85 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86 PID 1928 wrote to memory of 3116 1928 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://getitshops.com/Barural/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd775446f8,0x7ffd77544708,0x7ffd775447182⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4819384237696626262,14597453903083840183,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5fbdaafaaded72e771730dc442c5e7a2b
SHA1ee4250a1370a8b569a1f8b14c0f0a391ea3e8d88
SHA256eb219ea6a4b98b981cb5ec88d08d3eaffa3265feca50b17757f04bcb510b8b17
SHA5124b2934549bd99708ebba56364320cbc72497b306c7987f083d221c618bdcbd825eeb241447bfe85a5393d47a9bba0e7342c8b5144084d2bbe9d398de493dea32
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD528ed61b0d124b661a936caa0dae95b91
SHA1b205247f9f94259b5a00b050a55c5ddfd84ca17b
SHA2569801eea81c92b4c226131bff4eb56eb3ba314d328b8c0519283398ddde9c00fb
SHA512d1139a12925887333e2fd44b510b01eb1e2c1e872dfb572effb7881321382be6c13caaf1a5689eb8ca7d563f67c9d8e8220ba02edf188e395b24e1eb911e5e17
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
667B
MD51dcc274f95d5adb98402da0ea5273947
SHA19461bb62248e610e54cc78c8ede1e2422feae787
SHA256384830f1525f789c9da728f2515d7c3e7a5bc7ae0bd4acc55c0930e8f337d1c5
SHA512883786342a77df68f5a9fd659abe877f45c1a7433555d9e9fd01a6b736daf410630a2edc31c82983f0bd6028f9a468c5d61f298e5dffb15fe6c33ed093968294
-
Filesize
5KB
MD5768b19207c417724d92dabd71b4b1849
SHA1d8d6666e5968ddfd190ba4d8c882fe5c5ab52b0e
SHA25622cc1b3a3ae57391fbc9dd0fbbac21bc021fa9c3c07d34251fa1ec5b4d607343
SHA512d84c1aeaef1d9a51964b1cfb92ccc5adce704a3461ddd7a0e9699a32321c0a8748540291120dec36caa6b2d2d697d132efe8e9d22ab720e478ebe421a8113174
-
Filesize
5KB
MD5f837377762705500558c2ce2a751dfe7
SHA1a1a62420b150228594edf7a5909d9ca6839faeb8
SHA2562aeb9f31d89b18a8cf8d7792dcfbc89578db6114477c7514ad04dfb43a21ac0c
SHA5129ece536fe8c9edd75ab2ffc3298490b9c244590d9b8e4c7cc576bc61449f3912bba2ed6d44b4fe4631eac2470c9685f2c11b6cabb6bccaec15e58fae0539cd48
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389