Analysis
-
max time kernel
241s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://spotlessrevolvingdebugger.fabiolajimenez1.repl.co/
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://spotlessrevolvingdebugger.fabiolajimenez1.repl.co/
Resource
win10v2004-20231215-en
General
-
Target
http://spotlessrevolvingdebugger.fabiolajimenez1.repl.co/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3336 5092 msedge.exe 76 PID 5092 wrote to memory of 3336 5092 msedge.exe 76 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 4836 5092 msedge.exe 89 PID 5092 wrote to memory of 3052 5092 msedge.exe 88 PID 5092 wrote to memory of 3052 5092 msedge.exe 88 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90 PID 5092 wrote to memory of 3104 5092 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://spotlessrevolvingdebugger.fabiolajimenez1.repl.co/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92d2246f8,0x7ff92d224708,0x7ff92d2247182⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,13570366320879774368,16662398175203040253,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD59e2ba7c2ce0ee9957fcf737505e8f10d
SHA1a5c001797f7a0d3e3f5898e525b00865f183e65b
SHA256a337291112715285e5cefb37fbc2d80c514c9c222b9f1b0846a3f0471875862f
SHA512f2bcd84b940b57d06126fbf46d44042890cbad125fa12feebafc20b3e1721a8e6d464cfdaac2d7f8ca8646cec12f457cb9d8b4f213973fa4831416de2a107a12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
305B
MD58b044f1bea213c220a8e1ae631c48e01
SHA13f8470729199b376c45d1e9a95d0b58551ff8735
SHA2566e880282cf5030a8400ce6e9acef110cb7ce7418f787170126def2f06d67d46d
SHA51243b11c2c6af892212d6231b57cf876abef3f64540240cceae1849ecc1df923d4409099e7f192da41994b2978bcf58406a31ae8c1b9c3de44e02a1594bdb93984
-
Filesize
6KB
MD5e823673fbbdd007c05ea1cfec17199fd
SHA1be8addc3d0e15037c65c54fb3106419f86cab01e
SHA25607eff005a4a808ab6639fde26f0b1c256156e1c8e7f1012126f7d27548bd51a6
SHA51234253091ac5fdbddb1ba02c94b20d804bf2bd29579ebdd8c0b50eb0fdbf7aee13507f789451148d9bcb4c1cbe7f79e5c28f01099a3bd262a64a2dc7f2268c700
-
Filesize
5KB
MD5faf0140102cdbe899cedd86cc1c861b9
SHA1bb1e33e75530deca9f60270f53b13d6f7d75fba2
SHA256124b1d6da1ffb921ce7ce956e017a55872d24503189d6ae28cce8e6f1b1442f9
SHA51221952d447734bcf2eb2614d114df26838f8747f8c142677af7970f647d0691ab996e131896e436a86dfdeb098d4463b168e197416d08502eab708a72f53acedf
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fdb2e7d66132fae370145665ce7b712
SHA14d2c25e4f7250244c1ee435f9755d185a1a065e5
SHA25688f590804a25ca240fec46c96a7ac39685f855b94c95f88c72f996f546d9051c
SHA51299d2e43d60d54925ba73e48eac2c4449bf04ce88d21fc3dd52d7b56a0dfbbf6967edc2e72a033db6de3c468cfeaefcbe8e1e5c5646a6fda30aac139fe9f4e0f3