Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/01/2024, 08:23
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://01eee54b-fe46-4df2-a050-1a637a2e5cb8-00-1v8kkt9bu05ff.spock.replit.dev/#[email protected]
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
https://01eee54b-fe46-4df2-a050-1a637a2e5cb8-00-1v8kkt9bu05ff.spock.replit.dev/#[email protected]
Resource
win11-20231215-en
General
-
Target
https://01eee54b-fe46-4df2-a050-1a637a2e5cb8-00-1v8kkt9bu05ff.spock.replit.dev/#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4612 msedge.exe 4612 msedge.exe 3716 msedge.exe 3716 msedge.exe 4628 identity_helper.exe 4628 identity_helper.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4048 4612 msedge.exe 78 PID 4612 wrote to memory of 4048 4612 msedge.exe 78 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 1160 4612 msedge.exe 80 PID 4612 wrote to memory of 4772 4612 msedge.exe 81 PID 4612 wrote to memory of 4772 4612 msedge.exe 81 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82 PID 4612 wrote to memory of 3848 4612 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://01eee54b-fe46-4df2-a050-1a637a2e5cb8-00-1v8kkt9bu05ff.spock.replit.dev/#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd1873cb8,0x7ffcd1873cc8,0x7ffcd1873cd82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,7478235179392119340,17556213874064428440,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b09c5d9d170124cc803af2dd5f23e2b4
SHA141a3ddbafd6f3062f07ec162679bfab95fd88482
SHA2565e6d5fcfb3805ecd4d9388837551cc02c5452f03cddba1b29b23fd02686befd8
SHA5128fd1752211ec074f85d0ee59f39bea6e639199602d71ec947940575a9c515dda96b1eed5af10d513e21373f64a6d03146bb3251aa690830110ff4c6c486b4036
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD51f1fde288493e3608e672904ccb61bcc
SHA155148ddd5058a493cf4ca24c90148ba4450368ba
SHA2564d54fa1310fd2d0ead4a93d3aa6fbdff5154c7993b413835e52dc5551ca57e61
SHA512c520f4292fdaf3c0e27c779cfc583024537236ae3ec2febd899a88621dfa7f595c188b7ea4ead70d5dafbe0d7c1322f926488975e1e2a0ddfecca41fb170ee60
-
Filesize
345B
MD52628bbb549f7badbc69e27e706dfa7ee
SHA1b9523b9143f939fca94e2dce462e5a13bca28469
SHA256c528a4ab30126f25a550df5b133d6fc30db452693c48ed579866a91efd5e3317
SHA51200d183dc24323fe3076a8e4536eea2084fd43cac2c93172a0103ff1915bab52c024000efe82f7b088eb8d97f73142d0375c4824e2cf82cdb771db97ed8963aec
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD599ce0473b0e0ad880bcebf4037373a57
SHA10321cdd3fe23a957b437a10af702c45be41ded2e
SHA256181c471d34b2b6b41b3c247257f3dd5ae837f29bb531997f2361d3c3def8fb6d
SHA512f73193e5aa835b0c41530d27a3ee25bca7a259cf877139b3eb776813d89cac94ee8444537ed30721ac5a399432dd3a93b803f1172b81d571bb2c9546c44c7a62
-
Filesize
4KB
MD53db8ead075eead310a31e363ee470d80
SHA1d63c4be72760cc70487c6d28389f2bba562564cd
SHA2563850db362c6269b5d2bb3ea617f403cb6f8d61882b5adda2ae0366508c563279
SHA5125e35bf07a8c7af58856a21eea8e0e903fca0164c736caa79a5317b177ed0a613f6251c95a7b0e40f6cdd9dba3a3e582761b881e8bd39d7b856b3964b1e906604
-
Filesize
25KB
MD5c7092e044a47c593ef643da75dc6a456
SHA180e8bca84e362de86a7332742a62834ba887deb4
SHA25618ac390cf8b5d7c5ceb90ce5e744deedc18be8e33c84e214bb64fbffd0686751
SHA512b93ed015737a477a735c03e0cc884d746444d081dbb24d542ebbfbc2d30a5101799d2564733780091f28bf84adc3c7b2eadc265cb6bad6f26080abf63e0f085f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53c736d521bbdb2ca8c67cebad85cabd8
SHA1eb67e581fdade4748af272b98391751541f5b0cd
SHA25642db7aadb43ebf13c1510823728217ff7a7ba5795bb6f0a76912b6c4ab7df485
SHA512fb013869a7c25cab0869f4937bf80e45723f7e5ca3cc643afedf6eb0c8ff67281b2e3bdcc7fb073336a0413523b50e8830f8eca7b0310be0e06354a87394f8aa
-
Filesize
10KB
MD5183a4c0c5d1106629757aad9dc6e3633
SHA1cf7cf810605878ded5b34b42d272ed1277dbae28
SHA2568db757ac2f8478fa05064d7c624aafe178da05ec01f3ae05f0d64a71f33502b4
SHA51219a1a75e3fbb6edc7adf7e953039230875d5829d24a40ff78a16b1cbffcca9bde2b3b0d40090bc969a1efe1503c53cc9acd0a5537ebf53c6da15faad369beff7