Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 15:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://68Pw3690.pw
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://68Pw3690.pw
Resource
win10v2004-20231215-en
General
-
Target
http://68Pw3690.pw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 212 msedge.exe 212 msedge.exe 2828 msedge.exe 2828 msedge.exe 3448 identity_helper.exe 3448 identity_helper.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1132 2828 msedge.exe 14 PID 2828 wrote to memory of 1132 2828 msedge.exe 14 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 3416 2828 msedge.exe 27 PID 2828 wrote to memory of 212 2828 msedge.exe 18 PID 2828 wrote to memory of 212 2828 msedge.exe 18 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22 PID 2828 wrote to memory of 4316 2828 msedge.exe 22
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a5d46f8,0x7ffc1a5d4708,0x7ffc1a5d47181⤵PID:1132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://68Pw3690.pw1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16665938639453333603,13950695846367254256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:6068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5c62b5af37969e9fb85874e3498d74f6a
SHA1a40f2fe194dbf644c477a2069af20216e7fb0183
SHA256198f940d218bb89ad3503cf9b38f5d2df14fd1870262e14523cf19bbd9142e55
SHA512042ccd416c1caeeeddba79aab453ed3ab0d5462434c42ddb291e4e44cc36604c3a6e972763dde40a9eca4a39b0afdf0abee40ad99de929e5aa2f0e79830578b0
-
Filesize
193B
MD599ae22c3441935823773507e91d038ce
SHA129dc5ca8ed6b844aae14c360526cb4c3677838c1
SHA256a862ee17d7503f740784dc7a4dd81c458bc4ca5e18af54b104d51bbb1b518bf3
SHA512f715252d5a32c50a11147d416b430028a02b9fd748d14d20754b5d1412f2a97daf770321af3d9a06255698d88d9265782bd6d1017ee82407eaf3ff3a13206691
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5592e916c43259c29a6feeb39e93a46e9
SHA109e97abbd4658c35c66fb393767255d6f72cec33
SHA2567f670008847729c578cce40d8c68cb4dd980571ef9e340b161ee7041274467fa
SHA51298788442a559286d60d58a737bf25171f3e7b455802493055c88628ccdcb2bc249ec8b8f1e2855de61a819bd4aa4cbbfb6137d1ad67ec4b999c6583ec2640e7b
-
Filesize
5KB
MD5fbe1cf4550a8dab1bc18a15edaca15f3
SHA1634921db4c97a762899aaa99d5a9e4b21093a32d
SHA256a71686d6c01257a1b01b31bd70e9a0d80de51f3bfb7a6be1efe8332db94b4607
SHA51207782694eccd30d779d774019c8bb57afcb6f25bcf6fbc5ea61c0095265428666187fa940c95fac2260c570f92c84e59d05b0930f2d3f7e6849a22ded7ddcf12
-
Filesize
5KB
MD55edc85e7db743b13d0cffa531c11ec38
SHA15f155b7fa17027194ca02f6564f9344eb9c44a14
SHA256038ac231983c16677675634d889b8dc12805d6e5009edf163b9736986787fa03
SHA512026b43c926324907f3ed0ea8957804bf892ebc899661337d6b728a780e0077319ce6c6d25fe1c87ebec69858214c848aa63d799dabab0ca424d90d7dfef4c8c0
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD544ac0f9bf25b534febbe7440f2c9fd85
SHA11e859e83c0e3a9159e2d62bb5d7b6d6432eb16c8
SHA256cf6cbfa8e0d1143812ad6979751d9ed3ca000dfe66e61d4bd1e395fd72b8ff0c
SHA512ec5dbe241e18ff7477fc2a2f75520ad337d0c0776f93469593f68d59ccc05d612d3a6647412817fca9222ef08b7fcacd65a900f541412b26b2b960d648f22b55