Analysis
-
max time kernel
162s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 08:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://concreteachievers123.my.id
Resource
win10v2004-20231023-en
General
-
Target
https://concreteachievers123.my.id
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 3408 msedge.exe 3408 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 2216 3408 msedge.exe 45 PID 3408 wrote to memory of 2216 3408 msedge.exe 45 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 3184 3408 msedge.exe 91 PID 3408 wrote to memory of 4220 3408 msedge.exe 90 PID 3408 wrote to memory of 4220 3408 msedge.exe 90 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92 PID 3408 wrote to memory of 3432 3408 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://concreteachievers123.my.id1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef57246f8,0x7ffef5724708,0x7ffef57247182⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8539357669747906160,7283228767866928961,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD589d4af1a337cb3af639ba03284d5cfe5
SHA1ba8c3dd0afc707763e4d44161be95c852d00fb5c
SHA2567aed6558aec46831b58f94d235afc97c56eb39e58e9cc5a33e2ff59f7b34b590
SHA51220da09ac24ee4878c60efb52a9e52dc20a85fb79a148bf6867cc13095e24e1418e1c9ac32ddc721569c33d6b012ee5ced2bf4e2bb85bc678e967999d8e62fe16
-
Filesize
5KB
MD523205682dd45af50916d3f496aedb53d
SHA1a41e5b7df2576c05649043cf31e90036c00f453a
SHA2564584d05e41a0625e24f652039d8d1264f160faaf2a58f7e82836d914e30bc0ad
SHA5123d2e4c74e549116b164974a49ce3915603706ca71a9e3c0a4219638a792ccce5fe013b5c1aca0de39b660c926568d002a97556b0a4a49252cda4dd5f69ac51cd
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a9b589e2439f18e98fc7ec60b862734c
SHA186be15b4705202960d3f0ad74ab23e437618b04c
SHA25667f2711c21f8ac171e266889541adaa0c699773d6a4964d0fbaa02564c8a5fdd
SHA5123b024aa80ebdc99cb454e21abc9baa89ab7b03906c14ec08bf51d3c3c7b92afb3a651d6f36f5aa7224981e1617810ef1c8f2f6b60fc78244fcc07fc71de1960e