Analysis
-
max time kernel
241s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2023, 08:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zang1.almashreaq.top
Resource
win10v2004-20231127-en
General
-
Target
http://zang1.almashreaq.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 2752 msedge.exe 2752 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 228 2752 msedge.exe 84 PID 2752 wrote to memory of 228 2752 msedge.exe 84 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4836 2752 msedge.exe 87 PID 2752 wrote to memory of 4620 2752 msedge.exe 85 PID 2752 wrote to memory of 4620 2752 msedge.exe 85 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86 PID 2752 wrote to memory of 5056 2752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://zang1.almashreaq.top1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe572f46f8,0x7ffe572f4708,0x7ffe572f47182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4152 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9989871581471311768,6159060385433775037,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c89e9212e22e92acc3d335fe9a44fe6
SHA1c43c7e1b5fb58a40a01a6d8dd947c41a48e0b41f
SHA25618c46c863404b31fcce434662806fa34daff0f9af0a9379d898f772b5c398b44
SHA512c6961c171af63ddc7a72aaba4c9d910cc6a424794c416cd1ce51206f7c7f1100ca51c9e41d07d68489105dccded2294c1d761a8dc6be80d22c661014efd6a9ab
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5abd272c7302428a5f25a2f45a145fec7
SHA16d907635d9add387d4767557457da74fdbc15188
SHA256489400a1b15c40cf515bb17abe07b65fbe7b6dc19543a6d42499bb85c6437227
SHA512bd50131a04a28c46907898a0abbf6abdd4f8c57cabaf832c5505a947c4c68a7e6195b87f830099915340bf8040f041ba90a955e41155d1635787e1de9b215842
-
Filesize
5KB
MD58a3443efa2f89f15c645a996990bc0ee
SHA11861d8c26cbe8eeca93388f2077c5638f3752fc4
SHA256508c739aa137762e71a4b8532905d6246227fc49006f3151074ed4edff9c7e93
SHA5129abe2d32a613c4f0be1dc1430dc4e11dc472bd830652c5037f2bad2408c227c1bda6b426c585623b3e4884a269df15cf9421c453d1bdbc874e008f938f5545ce
-
Filesize
5KB
MD58544e946dd4eeaecf3c1a572a48a0f92
SHA109db1f8e010bbc395e98aa55eba8884f07fed297
SHA2560b1c98b5a35121e8652a7e4b22e3fd3b97e63f50d03f47f5c7e362b4a43889bf
SHA51267af63979866c94d883c8e4106b62383351092b0c7daa70ab2e11c719f7d181fc2c4217478de1c40a5be8740c681b007db7e88ae9a8a6eef4bd70ec5304a0784
-
Filesize
24KB
MD5d7b2b29ef1d9a33e61e1167984c8ca3e
SHA19a0da1a3cf9003ecf6aba220a8a00ca34a7ebd34
SHA2567d4bbec0e8bf4e62f352750240a0bc0f7844d58fea590bc6a9fc972c3b752dc2
SHA5123cc40b7e35c0749e419b035a73768c8f76bace77ed44be6a59469a032b643da15162733e5aaa94064494b055858a24e4f79326a863f31f1c28eab44cec35cbec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f15c0f9435ba30b34eb23cb109bd98f7
SHA1d9acaa2c47ac497eb7b02fe025d4a800528426e9
SHA2561eb0853ef90b36964212c3ca38ae1495392b9c1f2c060aa7cd1839aa6e1b0afd
SHA5120492b95349d0f41a3a1446ad6ec15edffa19cc3d8b19f6fee420a4bd32d0666e503ff6cc75442a42fa1f2ca61dbe3ebc30fac1f708f688575e894d4747b75e5f