Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://assets.stickpng.com/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://assets.stickpng.com/
Resource
win10v2004-20231215-en
General
-
Target
http://assets.stickpng.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 4832 msedge.exe 4832 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4792 4832 msedge.exe 88 PID 4832 wrote to memory of 4792 4832 msedge.exe 88 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2960 4832 msedge.exe 90 PID 4832 wrote to memory of 2772 4832 msedge.exe 89 PID 4832 wrote to memory of 2772 4832 msedge.exe 89 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91 PID 4832 wrote to memory of 228 4832 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://assets.stickpng.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8534046f8,0x7ff853404708,0x7ff8534047182⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6124636716460374183,11103434605475227693,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
476B
MD54decea21418336f9b98a343ccafc4700
SHA12f8a4b12db7f9ad35edf27bf447e8ac712be91ba
SHA2565a39a1dc7695619b5458fa48efc76d88e9f64adb07db0f902bae4acf101f7f26
SHA512345007d25367a9de64eb6ed4d87602eef53bb706034b9c64da4b4806041a32c092edbe5755974ad6d5c60ef4c2e130f1a09b4834011a0ca6464dce807c772d2a
-
Filesize
5KB
MD5ccd778a560e043b30d33fcfefed602c8
SHA11f122fb3fb22532c81398091c159c3421182c4fd
SHA2561d656774b2cb1e1f500a05e4ce7204e3020260af1c1d78fc4ebcf8433c5acb42
SHA51290c204377ded688b657c751230e1b289eb2838057a1765a6db8e28c287db45e40dce186693375aea29414abf54c28e6c1d2d4ef362eddccec50b6a1a312c39b1
-
Filesize
5KB
MD5ed6d157c2364f1180e934751e59fef54
SHA111a647c57617559149942f8e146dc9cdb1e67fc8
SHA2560755f3f3e18f0f85d3c1aff62b44c6c71b739c83adc888fda083b523c2db6ff2
SHA5127e6132a109244b82a8dd8503d023a67e2c2021e729eb70dcc13cd22be7bd1f89eb420ad802e6d4722025225756a6c6d59ecab8d1a6cef0c3e11d65c3de992d34
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a7dd8dc2d5d843d3dc71d0220f0a2ce1
SHA1d74bb4c86ec19536f052d883219591b9b7e571ca
SHA256acb36276878b6802a288138c07edc92bfaf7afc3796eabd6f60b98b19dc6915d
SHA512266003362b0afa09cf2cb58cf49bbd9cab8af4d10117f612b5f90930d9b45aa489351a109406590fd5cd1877add0abd0e12c084feadf9bb13b5fc2f60d511ffa