Analysis
-
max time kernel
46s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 10:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
Resource
win10v2004-20231215-en
General
-
Target
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 1292 msedge.exe 1292 msedge.exe 1432 identity_helper.exe 1432 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 544 1292 msedge.exe 61 PID 1292 wrote to memory of 544 1292 msedge.exe 61 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 3176 1292 msedge.exe 87 PID 1292 wrote to memory of 4788 1292 msedge.exe 88 PID 1292 wrote to memory of 4788 1292 msedge.exe 88 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89 PID 1292 wrote to memory of 2396 1292 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd905b46f8,0x7ffd905b4708,0x7ffd905b47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15758103033721502557,5053564766478772396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bcaf436ee5fed204f08c14d7517436eb
SHA1637817252f1e2ab00275cd5b5a285a22980295ff
SHA256de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120
SHA5127e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5e7166f6967086b33a02197dd4ac6f125
SHA186abff3e50a4150ca7a75b338d57a863d285f010
SHA256017cfa31045798b6eca9849ebc92f611959a1ff2a12b9dcae71d9d4920843a31
SHA512952535ab00a34c9d71b92ccea98b2e775aa28c8a2e4100dd6f6c75b4d9fdd6caebe73423181b377e47b41aea156aac3a321f52509504d6a11964669703670c48
-
Filesize
5KB
MD5221efa0df10aa8e9b2acaf253b20dc03
SHA1d3d30467cc932d5fece7007a2d840443c3ddfbc9
SHA256a1ce7286b1510c276f9827aab428e9eceeb69c13876b0fc31add93b967de6e93
SHA512386e9363508f4c9de5ed808893bf3ae34bf1e5339221fc6f26328f2729f753961104660ff247b7354f3bac9cb19d0c75be333abf5f946606b039395ba5e7bfc6
-
Filesize
5KB
MD58d56a3720071405ffeaade7b948c6d4c
SHA15734026f67634fc6dd1195554001f10180f4d608
SHA256fde574e68abcad6688679ce4b44f73fcfa20ba9546aaa8dd67112fca704f683b
SHA512fd72e7ac09c62a4f7296272a524f646695f527da14a543432b6b66da2c384217a6ec175a62975a8d877373ea632462456a6c01a8318db04fac3566887308b925
-
Filesize
24KB
MD5b0ba6f0eee8f998b4d78bc4934f5fd17
SHA1589653d624de363d3e8869c169441b143c1f39ad
SHA2564b5ee509e727accbd11493dda2c1d512e7dbfaff66c4f5f7ea9c2d2ccd06151f
SHA512e9a165da246c6b80fc38431538203cf03f95794184ff63f00c9500f8919a2028b803f64b670e685185eed72df0509e3185c9b434fdbf2bc7af36021d46bd08d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b000d03957348d7e2de51e18e161be12
SHA13d71d358b0c458fb95eb14fa84d63712d5fd985d
SHA256707da832f96abcc5e0f4492f3b9ff8735d12250b26ffc32573eb0ac4456d9790
SHA512babad861469929c64530889a4138f5628cb81836c05fdbf637648288ed60ce464070759d93a767ce3692753c9738ef7aaaa349af03777a476325a75c86bb9507