Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 05:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://r.mexiconow-sifsa.com/mk/cl/f/sh/WCPzyXJTZ6uvh46DEolrUXoDE4LSFEYM/IQTKJckI5vvq
Resource
win10v2004-20231215-en
General
-
Target
http://r.mexiconow-sifsa.com/mk/cl/f/sh/WCPzyXJTZ6uvh46DEolrUXoDE4LSFEYM/IQTKJckI5vvq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 4120 msedge.exe 4120 msedge.exe 4696 identity_helper.exe 4696 identity_helper.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2020 4120 msedge.exe 87 PID 4120 wrote to memory of 2020 4120 msedge.exe 87 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 788 4120 msedge.exe 88 PID 4120 wrote to memory of 1432 4120 msedge.exe 90 PID 4120 wrote to memory of 1432 4120 msedge.exe 90 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89 PID 4120 wrote to memory of 1076 4120 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://r.mexiconow-sifsa.com/mk/cl/f/sh/WCPzyXJTZ6uvh46DEolrUXoDE4LSFEYM/IQTKJckI5vvq1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe27b146f8,0x7ffe27b14708,0x7ffe27b147182⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11436025505099656137,15183090318549305020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD549aa5ce5e2152706c97dbef17e7f44cc
SHA1dc3980efbd1f7810cef41cca7cb67ac975a79dcf
SHA256dc86576836ecbbd7d16ea3d66d1195bdc5a749155904f5a1328934cf70bb9f18
SHA5126aaf5e5ce8cf327053bb4826336256e77cceb08f003b9ec3c0fcbfca717c353a91783da0cee4ffedb3597899a4b2d57b1641b8d6c4e955f870118896a3b5652a
-
Filesize
748B
MD59c32ce4a56e0bdabbac2204710b74b11
SHA1f18e409ba832cabf37b840188c32efe1718f7d2c
SHA256fd2b19f266e6f7cc6a3cc6d70be50ab2ad330115e5d41c3418e093abc0770d18
SHA512ab73f7b023173080cf1fa2b9710498d896cf950586fbb3637124f3beb3bd1e24f93fe18cb5738fa588d1e5322c210ca5211c8f733bdd981d30a1d8d7f0be6081
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5db45f18465ba491885076242dbf080cf
SHA1d2d1a41fa572f11495583b43dcd75e291e4c0ece
SHA2561dd0255d2ccbbf5b305c54b3759bc6119de4c41abedb4926f1808b2cafc0473e
SHA5124689fd058e1f6269a400e384b5745dbfa0d0f0f39d6fe2254bc513db667a3ad6f93649ccfdbabdf5d262ba99eec22b9feb3d5c29da39318945655abfc8ff5402
-
Filesize
6KB
MD52c864f9952405a9d3079be79973f785c
SHA12a2610b6181d6a5f46d94de43af05f6fe675243a
SHA2569de77a78cd41ed29907436b0a8de4d5f437419f88247abe94643e3b269cec140
SHA512d7594391c7a2e571b6e769e5aa631e0712f489d2a578a6b3f951051e73d86b34d7d8fb2e93f0d319a06f1cb5a5a0aa04d455bf517a65d6af40b5728d25714468
-
Filesize
5KB
MD581e65e2a8dfbe1e581ff43c8648e9a56
SHA17b6c892e42184d38f7631ad9a5b1df13e84c4316
SHA256dc44dae4c5ca0200d3aeac9e6be4af186230404e90998171fdea9b2aaf971b3d
SHA512dea04b858bf603ab934affa084152cb68de414ae1d46499093b45ff5f0e90f1d31023f2fb018fcce0b6e91bec173b9db6e4a1c8ef89c921447f7fd59c07f72e8
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5418948697afb3ab9555b12a83c4b3512
SHA1f1dac97ab40cc2ec18182971182910693d35b885
SHA2565c298b0bbf2737aa468b4be263395cefc4b6c57f51d1743d83bab3dc29ad15b3
SHA5124cd1931c421edae1413f8af3788b9ae41db8cb9ca4089d6a4fa21cb0e23f909819e90f9b5c42cc20fb73318b50dde5dcffdf6689188bf6cabbd8f0c3bdc6f8f9