Analysis
-
max time kernel
55s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 13:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stecmcommuaity.com/109534090642
Resource
win10v2004-20231215-en
General
-
Target
https://stecmcommuaity.com/109534090642
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4316 msedge.exe 4316 msedge.exe 4448 msedge.exe 4448 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4448 wrote to memory of 4948 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4948 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4840 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4316 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 4316 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe PID 4448 wrote to memory of 2152 4448 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stecmcommuaity.com/1095340906421⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac9a946f8,0x7ffac9a94708,0x7ffac9a947182⤵PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:60
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:4980
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,1673019475443529984,6942806347834315039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5ba556b3110d7ac304ae4b37cd4fc819d
SHA122d7a8fe657dfb98d2533c66e7de55b64d196d73
SHA256a3693006978ed1c35a8bc1c3c3c49dc9a91b1a3671e890958445c22e5626d2cd
SHA512e07ca8ae253193f4e671baf5081b6e748b2cf7820be7a7f27e95bbbd3a65c9813bdfc1d45c63365b21f226f06554c2370b9d8b16c2fe3cd22549650032b5af87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5e3f6efe73228bdd928cf2b50706d7512
SHA1fadc1a16780ff81dacfba9abbf0b736d3240f3f8
SHA2568abdcc6a2151489f2636b368098d1fb1e935268f6d933f5e155419fa699a2ccc
SHA512fadd43b2ac4df00ce2b9ede06c78005f229a01d65d76668664f8691ee27bfb06110c4cdca1603e4cc378a27b6492569972e536b9b6469a3ba843b6f9da670159
-
Filesize
152B
MD5fa070c9c9ab8d902ee4f3342d217275f
SHA1ac69818312a7eba53586295c5b04eefeb5c73903
SHA256245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7
SHA512df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD573a9070a1d54eeb5b0d048f19d275dd5
SHA1367d103de7035ee2a279dbb117cfdd102742d7a7
SHA256e9e551cce0c50afec76dc800e2847deb7e50bb597d328db3849336623dabcf59
SHA51282708170d458fc31aafc42854d9b33ee5838fbbe1e1bc2a02be466e33817567140f97442ec6fafe467a290c0b36a55a5ab22f1d3c342ae244372c0355b394d8f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
788B
MD5d29a11800e7cd4d0e7ab5d2f9df2d266
SHA19069a48dc15ec69a6a37f227835f5e2f20b4f1ce
SHA2567e9adc61e8d912ed1fd5c9b0bd53682ea47062e45db4e9dc757a6310b3861e0c
SHA512f0a95728e2320cfce60085c467d6ee1f50a108b84d7286606787f9c433b04aa57784a23ae09e9e8664e55aaa5e046f1cc2a307ddb080de48cfbcfbc3842c8b86
-
Filesize
5KB
MD57a61298edd0179aeb2b6d902ab67c5a8
SHA1c2be69a6516d30f79e2a71b5cb819b4c97d2cee1
SHA256dc5c5659ecdb0c51d3842db8385f719603fbf8443c60b9d6ecd56d055dd8ff1b
SHA512302044e829f000df345ca901bb36758d60e4516c7efb74280163a620b0005b62bf010b70db62943689cb7bf717382b3ddda72aadb4a6986f855d590787664763
-
Filesize
5KB
MD5bb7d9021782e5133deceb1d68f08327a
SHA10c9e0cfd49d18e6470af54ca1c49dacd722eb813
SHA2565386b0d67a3af4e5a1dfd41caa3444b0ea7b4a7e5c6da9765e5ebe9d008d472b
SHA51280c5472b17c743344080cc2b83fe11c7fe0c0c2b566aa242ca08972ed7c8bb651f6891d3995e473e374eabea01e2de6d460ce2ab978b19bd816c4066674027df
-
Filesize
6KB
MD5304a4742552376459633e404dc5e1212
SHA1f058d21604c781cc6dd1605c0517d08dd151ebc2
SHA2568aac731211f8ccd4fda380aa949ac22d4ff6c8734afa9d4620e4ba68cc95fede
SHA512bfd6010c79f81a290cb28f93dc41cc0781e6a8780960eaa2a2e1835dd6518f9693fe26427e45abf762590c7d288554a7679b5f420fb6fe13bb7650a7462b342e
-
Filesize
5KB
MD55ae17d0013f675e50084076a6b3161b1
SHA15e0c9190a6920cb7601d053ff22807d110342da7
SHA256f1ce35402efba51061683ddaeebd75f2ce554b9c8e669270ca72836a6be585b6
SHA5121851f4ff8a08228f1fdabb2f7fbe7d4583d17cb3c5ef1bf89754d829367da1c3220b730901c03e8ca43fdea9ca47da017003e1afb210dc4719956ddc80c742f8
-
Filesize
24KB
MD5917dedf44ae3675e549e7b7ffc2c8ccd
SHA1b7604eb16f0366e698943afbcf0c070d197271c0
SHA2569692162e8a88be0977395cc0704fe882b9a39b78bdfc9d579a8c961e15347a37
SHA5129628f7857eb88f8dceac00ffdcba2ed822fb9ebdada95e54224a0afc50bccd3e3d20c5abadbd20f61eba51dbf71c5c745b29309122d88b5cc6752a1dfc3be053
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59af4be36aa5045bddadec85298fe0153
SHA1efc2e051d6587f76bea57cdd99d16b6bf328c0d1
SHA2569280d0769755b262383e23e65ba19d44d4f479666aed88581e955248daf03c0c
SHA51258739ca357acee3336ee90de39fe21fb082d2ccc4958e93bc3b5b041215b1eb8085a4aa9cdce28e5c1a851c24fc72f8cec40104d1c857c456af3757ababed5e9
-
Filesize
10KB
MD54c34fd037a5bfa6ecc98e6c2d8c5ec6c
SHA15679e060604662377109f76823cdedb0c790fe89
SHA256193527c7bdd0244b85241d7f2a0905998042648ebdbe088c144b2b9930566285
SHA512c582cfa56edac976e61466f37be65295adc7deb6057ec065efbc305f3501247e7e1495aaabab9e33840b37b9b2d9ac794d6ac2e0045034ee5700aeaad8d46bb9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e