Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://auroratoto1.online
Resource
win10v2004-20231020-en
General
-
Target
http://auroratoto1.online
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 3316 msedge.exe 3316 msedge.exe 2992 identity_helper.exe 2992 identity_helper.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 3984 3316 msedge.exe 83 PID 3316 wrote to memory of 3984 3316 msedge.exe 83 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 976 3316 msedge.exe 84 PID 3316 wrote to memory of 2244 3316 msedge.exe 85 PID 3316 wrote to memory of 2244 3316 msedge.exe 85 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86 PID 3316 wrote to memory of 3380 3316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://auroratoto1.online1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc70b46f8,0x7ffbc70b4708,0x7ffbc70b47182⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17316421584080700774,9978060581934176619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x530 0x5201⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
1.4MB
MD50e6ba934aa990979f5da4122dd5ffbad
SHA12badfa4f4c2dffd7a0a3f6f081862943f0f84d1e
SHA25655ee2c510ed2c73edbe43b473ad28889eff35be6572bc34b4c95f62fcf0acf8c
SHA51237f4d264b6bc192c02d3081f630fa070738e163ebba1a66ce3fc3c52e33e41c479fa346ff9e9678712a5201c63d86ee8d8d11e53f1b45ae152d0c57477f25d0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD590a72086fc0cf581ff17000792d82fee
SHA11294dfa3b9579f16ceb76f3555fd7e02d7079887
SHA2565d3f8fd885a4fbceb12db9cb1b0ff3db2368a22e067889b1a9fd47891c7ec8dc
SHA5125e569920236e6edb8c3a6eb75bd26e05cdfe4c9b53299cc97332f41fc619e6a89f05e92d1f192e521d88145ea2eafa3d5bd21683c81c2d2122d1d69e069425f0
-
Filesize
1KB
MD58f44cc3f08036faec86fe91b39c13b45
SHA1de6c8ce1bcc566dd6722ebcf97b70bd1c882e951
SHA25628bb38de445c9b3828360176d6ed95da51f3d153ba7d97ceb97f515237a4309e
SHA512cd1a93277b30003eda2c11d5025a5dae1a24a6c7400c1ac1e7db99ceb7624186fd6b746b63db0861776330874e0c7942ecda8f784010dae617c546655702b20c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD56905114aeb1109135821c4762564e3dd
SHA1815fa92da61e91f356b2d1d018df2a1f15fd0bed
SHA25628949301724b49d2beb25889fb7b2c836e1002e45cec0d104a1493546e97645e
SHA512811b02954e93fc95fcaa85ee7b263084610c2daec1b48eef2bba83636d454f446da1edf1bc0ef0f882a641a6766310f315cbdbd31dffda8e2d5e0d9bf1939d63
-
Filesize
5KB
MD5b35bcfb25763bca3784ad5029f8c2eb7
SHA1cad9d77b8f99adac37997ea4e043b45af8593e63
SHA2568e381dd21d5a319bb4fb7a2580a8e68cc3e5e4daafe16fa14766bfecaacb0ab4
SHA5124a99bc14428cc543555535ba5df320ef735b303294d8af13e227dde7a319b83448b7550e6d65dd9c958ddb4da4ffd820d4609e556fcf376bd748fde148393506
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c614cb1aab0b70ecbf80519534b19492
SHA13e68c5779b9a569bd037fc3be38b20c4e5569d6f
SHA2566a8b42c027793f1b0cab4eacffd458f5a46b0037202fbbb3eb0b874630f844b1
SHA512ee007fa9376ef5e47e87e7ee0be41ae2e3754003cfe3c5bece6aff33f6e307c54f442340bdbaa2a290b050713922e07ae14f0d58b2d49c77381eb4fe074f993d