Resubmissions
22-02-2024 14:44
240222-r4fslabb7t 422-02-2024 14:40
240222-r2bqvsbb41 122-02-2024 14:37
240222-rzm14sbb3y 422-02-2024 14:34
240222-rxn6dsba9x 422-02-2024 14:25
240222-rrpjzabd88 122-02-2024 14:24
240222-rqphksbd59 422-02-2024 14:21
240222-rphnmsbd24 122-02-2024 14:18
240222-rmqlgaah4x 521-02-2024 18:57
240221-xlxlaaeb58 1Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 14:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://j
Resource
win10v2004-20240221-en
General
-
Target
http://j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 440 msedge.exe 440 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 4412 440 msedge.exe 49 PID 440 wrote to memory of 4412 440 msedge.exe 49 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2776 440 msedge.exe 90 PID 440 wrote to memory of 2024 440 msedge.exe 91 PID 440 wrote to memory of 2024 440 msedge.exe 91 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92 PID 440 wrote to memory of 4256 440 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://j1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0f6146f8,0x7ffe0f614708,0x7ffe0f6147182⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1830015123992695010,4969846322014741222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
Filesize
6KB
MD5cdc18222c06ca017010c868b950463e4
SHA1f89996c8b18813ccee023cf3fef51eb2c8315c24
SHA25665585a8ec20d84f68c89e021fcc4cc222bb843b163f8a22ac5c98217996eecd0
SHA5129271e89a90e9a49c6c4245c3f607038285f8035c2e81cf951b7750c6454283191df010ccadf91aadf4e2d530b601d5b29e8fab75b1ed0baa498c5445d02428d1
-
Filesize
6KB
MD54cb5413150db77e81e0845d372f05bf6
SHA143d6e1608ba0ab793dd096c517cc06f0dc97a030
SHA256c623f7813ea33f1f6893a2dbde44dc27f8ccd4158c5f2d5e00acab27cd2a73ae
SHA51297c3026e891f3793b874fef90028562ce0dcd102643909891edb7c610202011e68c9653830c80f94271e49dff1a213abc04a6cefd6200700f91bbed43ff08a5f
-
Filesize
6KB
MD5125d9a20f17398c2f3434fb16e32eb2b
SHA1775662b48a9236e45ec06dc63909e0ba97d56f8a
SHA2560f176b95f97bf2955833b9f96c1f45ab9a44df4d996d697dae812e4b04e7c8e5
SHA512f2a9a047974385f8909735a56dde13f9c24f63fb468a1db8b068e5e05ee3f393a7dffc35f04c7027cb5f15538f612ee8ff2e91ef8e9b8823c86a27496d286d05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD555841d941ef2f0e39ddd7637963d4f33
SHA18bb500470b39d7c125435da92baa8792a569435d
SHA256db1c122788207deb3d0fec296691fa946d5cb5106f86a242abd5015746bd4f28
SHA512ddd59fd6141e516a6bf17db2f68b083eebf3a1009e0a3f5808df0b9939474adde5c198c166972fac7dbc984fd365f68144c132d7cc82b7bd76e9e5eec07099dc