Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.optout-nvrw.net/o-rwlp-e61-470119243984a48bc2e73d0b1b965c67
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://www.optout-nvrw.net/o-rwlp-e61-470119243984a48bc2e73d0b1b965c67
Resource
win10v2004-20231222-en
General
-
Target
https://www.optout-nvrw.net/o-rwlp-e61-470119243984a48bc2e73d0b1b965c67
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 640 msedge.exe 640 msedge.exe 1080 identity_helper.exe 1080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 4996 640 msedge.exe 44 PID 640 wrote to memory of 4996 640 msedge.exe 44 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 2144 640 msedge.exe 89 PID 640 wrote to memory of 220 640 msedge.exe 90 PID 640 wrote to memory of 220 640 msedge.exe 90 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91 PID 640 wrote to memory of 4364 640 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.optout-nvrw.net/o-rwlp-e61-470119243984a48bc2e73d0b1b965c671⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa47146f8,0x7fffa4714708,0x7fffa47147182⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,690567167730490078,5356225581635319515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54a5eff01cc925aa83d6543fc99b54e9c
SHA1ccdaf374e5fb4de349f639ec334330dfae795f93
SHA2567f95195d28df13d2c1d2e455a2084bf3e7c59841909d85213531f00fb38ca820
SHA5122935ad3dea8ebf097dfb62459fa82b53b9c6b8b3b674fde7967d76b83ad30721edda9e03bb90f3bd6f3a809c035eb79a39ae3e717d9d85c32b73a51c337077d5
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
5KB
MD55a914c05eacb62037ccb3b8ed579b01b
SHA182030ba29da21b26a60b3010c834d2e45fc120ab
SHA25600eeebcc9b8dba03bc41af3a45a7f762bad9d6ceddff97b7e5379750ccf53a1d
SHA512bb6c2689206d0abcf9b14e28668f001ff8a5fe5aee581ae230dbbb1676f805bd9faa53e31cfa85b46ea67954417234db8727bf9c8a95aa8d3c2ae78dcfd6c1e1
-
Filesize
6KB
MD5457c7fe99ab68c4b674e7b99e8c800f5
SHA16427a9d958bf854759f47a689a2645518583cadf
SHA25689d7eb39c214cdf1094568e599d96b94bc6b7a164b009bd87b1e8b8d3c4ac944
SHA512231e4fc3ac8b0e4bfd9b86eb88f115fc62ddadd5c8b8e78158ff8cbaeeb9de9f0d24ee6147fa706c1a3172f21298a44bbe88dc054fee85f3b7c6a37620b67137
-
Filesize
7KB
MD5a1d2e8a0e8a7954586563d59228d73e3
SHA1b617150d7450f91f939f6d017ff0a63d22bedbb7
SHA256fdbf075ee26a5467400c6deeee8ef4847ced0f7c148ff2220db9bf3e43adf6c5
SHA51205df92ecaf895a9a717aa3bfb5d2c79b2111f49198e1fc55dfedd97bafb66ae5fdb64b9cd06a79460ee6091df48f5b067b4fc61146bd1822a75ceff4f1a91d2c
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53dd1a3c7ba70e295795365e91581e63f
SHA17491620b62f1b4c39959fb40396d7e805a591c4b
SHA2566600b388312e1e473cfd1d30ea6c2a62bcc731f9f46a8f51e0beb934b11978f7
SHA512d9c5909f7cdc3130c776b95aef3a7e37cde13c322b19db16162eb62ee49cc51efa2e6504d69ae78f79a196dea2f39ceb138ea214f53baebed71045ad3ede6341
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84