Analysis
-
max time kernel
1157s -
max time network
1164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 18:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://12kbps.xyz/repo/vir
Resource
win10v2004-20240221-en
General
-
Target
http://12kbps.xyz/repo/vir
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 876 msedge.exe 876 msedge.exe 744 identity_helper.exe 744 identity_helper.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 876 wrote to memory of 920 876 msedge.exe 59 PID 876 wrote to memory of 920 876 msedge.exe 59 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 2100 876 msedge.exe 88 PID 876 wrote to memory of 4772 876 msedge.exe 89 PID 876 wrote to memory of 4772 876 msedge.exe 89 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90 PID 876 wrote to memory of 4724 876 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://12kbps.xyz/repo/vir1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cb6346f8,0x7ff8cb634708,0x7ff8cb6347182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2824302878956264212,1187581936593400443,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD522e3ebcd7b6d0fa4921a334540c0bbd2
SHA1b8905e5f9496072c0b047a855818de8f0ffd36cf
SHA2567e0016b8cffeec829b8448c6f2ba68dbcbe26a124b8f7845f53f5249c20c04e4
SHA512a7822248709b503ef94fa2c05c2bd07af3702ae47b59d13081252fa6e2211eab57385da98c66158029fa4089ba168ab0701683406a6bcce7c25494c67527ecb4
-
Filesize
512B
MD578c3bebf8e1f2bcf17298cef7b4448e2
SHA1ea999bcfddc4ae155e0dda846cb6f880d398506f
SHA256257a08bc064bbe21684cb67bbc4515c5a253075abbef7266b977ac150a18c8d9
SHA51236a7ee783e5db85417acbc6d2ac566edb994be5cb072dfec75d4f32d3e5843606ee734ff1419fa37125d651351ef284331c6c39924ae93816767e9f8d3461b26
-
Filesize
6KB
MD585db3c36cbe198a0ca75615baf5d55d2
SHA18713d23e1a0925e1cf9d784167662bd5bab2af4b
SHA256b174e39fe029bb2d0fdebc71d8ba6f0a1694afdfc037de6f7da590a44c40271c
SHA5123f79d9fe0bb085e77b6a426f8b58c19ec82d8ab89ea3c2c16306d6a6304ea33aebdc23abd26faa3f1a90d3fc71916bc42e25279331a235ebd264da4f847b26cc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a87ba605-5e4e-4dd2-803d-7e51fe45e520.tmp
Filesize6KB
MD55dc144be2d392ef78491104a215c08fe
SHA180210136528ab9b6a5126eed2a51400642e6f5f5
SHA2560106a1b4da0bdbe90d0c64d50ce3037313f76818fe8004e45ee267707c3957b9
SHA51290f3d8e2a45952771d4e8754b498845964feb53df448c8bc8bdde0d9892c7fea3e4f5429778352645ae03def62d2f7eca8a06179d72d08a7c94f2de1bcfb9b25
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD53193f7525d5e1df299931217663b3e8e
SHA13f78b7aaac795c174348a837b38abace5ee8b8d8
SHA2565430b3e1f26be31e8cf07d1f9514567b7ecd8a87be7c5cfcce19d97ce1706946
SHA5129b1f92c4c5e12b4368c2a44c650c7758a4908f911c52bc1e0cd7e37f62ec629b305161aab886d2475f468a22cbfe760fcaf6dd4af05712ce5dcce742237e6e6f
-
Filesize
11KB
MD59994f7bd03e396873d56c81d98194d06
SHA1f267c26bc1dc9f86abff0ac95929767a924c87b5
SHA256cc5e3cb126429c202b4151cb30754213e622c7406efc5c21739d39b58fc2b7dc
SHA512e26c1015a7a5cf637e155d0993fe5cf46f8820bcc5c79e321a166d3e8523a61025217b2d9ccd0ff70c5aaa0a791a517483115cc00ef5ffa4b4e1c53b61afd84c