Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 15:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Youareanidiot.cc
Resource
win10v2004-20240220-en
General
-
Target
http://Youareanidiot.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 4840 msedge.exe 4840 msedge.exe 2080 identity_helper.exe 2080 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 336 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3088 4840 msedge.exe 86 PID 4840 wrote to memory of 3088 4840 msedge.exe 86 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 1244 4840 msedge.exe 87 PID 4840 wrote to memory of 2112 4840 msedge.exe 88 PID 4840 wrote to memory of 2112 4840 msedge.exe 88 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89 PID 4840 wrote to memory of 1508 4840 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://Youareanidiot.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7fff602646f8,0x7fff60264708,0x7fff602647182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 /prefetch:82⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,14145319500786186410,10612336935859993524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdf4a759acd43c3d54213b9de2bbe047
SHA181da78a0894c8742292af1057383e39588df4e95
SHA25660ad530f2bdc411f4c0e1437b28896dc9c45a950a93cb3c2cc9e1ae70b629b7d
SHA5124569267b06df28b47f87d666cad4cc63151ddfbe494a26a8ccbc9375fb333596c329778372d2dce5cb53037ca6b731bc9d0bec52eb18e0899e6555600bb305d3
-
Filesize
152B
MD589cbb20cdb08953be45a7ce57ff680fe
SHA18dac492c4f5fdd777f4947d58cc0948664688d9d
SHA2569b2cf9b97e1df21a5591ea406c579d3d62949a085012b136a06026ba48ce9ff4
SHA512b32ffc555641fed2fe0afe144dd5470f6eb01fae9f891c43e5217e231ff730a0bf7239030c12e54a7f3ad2c2c43d7322bef5bc5f57e002246fff3d0d5a86a464
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5052c3e73699998a679140bb01d61ce66
SHA121b1e713482f7577f0bcd6f54df19b486935685b
SHA256f65b777a0d417c8004f12acbe39b3c25e4a6e09f8d2f29d7216a27cbd3ab7d03
SHA5129b4c59a5ee0fdc223205bfcdafb47f116f52d49dccd3f06f9edc116d3eaa2d3a5ef239ab5fd4bf395957e0cd817b099871a2276be74d47f66b5ff700834d2801
-
Filesize
184B
MD5b88f247eb29ab18ceefffcc93358b1df
SHA17695a17a01bf978f93603de7349ca8e52bec87c4
SHA2565a36b6618062d5914e152044e662f742f99f433655d106e7e59d2b005d5702c3
SHA51282ec3d18f129fd6d8691c7890ce7268b8211b1b21486e37dc43bb9000ceb29f79f429c0c9a933d0356a415823f53502ab08c5eb2af4fae272b337b31ec70e558
-
Filesize
6KB
MD57b1dae0a9bbf2d736bfc063497451d13
SHA181035d4574579974147d6cd277929cb10922e1d6
SHA256778b95ee80d5dfaa6dfc42fdb1b29eea7718ff1f9d58a659c4f72a8da5a5661e
SHA5126aaa1d3057df133baa9e09bc245c17c547fd6b55533d32774b5f782962f72357d0c4a0f079a459db7d8cdeb29ed27e6f6908c34946cb5c6718f038db1084989c
-
Filesize
6KB
MD5c58a0bc0df82ea2f6e71b9dec8c99a23
SHA1e9d5fee1e9b8ac1f6c897bb6c383339b32f42c21
SHA25694dd767c0c734acdf0a6c032ada5c263b191d5494fcc04ce447a1e9dd798f428
SHA51242e120d34f1fa90f15cf7156885ec688ce263cd919c5e154f208582f52f44aa9385e0f37c74b0d5b3d4c2dfb2ebdc9c1580601cb9ae5d780aa61a31500dbd9f6
-
Filesize
6KB
MD5330c1808401316d8d66e9d60e5cbff98
SHA163289ef427d79ceacc5efd1d02a2826a9998daf0
SHA2566a28c1f658c98dd5d6f1427bf7e06428aeb7c5e5d7d37577203880ca40be875b
SHA512e14cb8bb5d5cc61a0c990de1d595deee5f71b91e2e8291430542a62b2ac197ebb17de86dc6ab0b81cbd01af7d6000f5e58b50c62bdd04da6d843e9dce7330bc5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD595ca57849699bee641a3557df8462f8d
SHA14406091a12bf12e40ac877bc7ced89b0aeee2e21
SHA256cfa2eeda42d6683df29bb91a408d5e3f002a0733083ebb0d6ba3a0bbf7b17926
SHA512bb8bf8a85b070499f0966da044fe3983f087693ff01edbdb5ad38a663ab63ed38ddd9066eaaab56f5e5cdd87ef1204cb0a7c1448014e876401f92ea95700008f