Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 01:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg
Resource
win10v2004-20240226-en
General
-
Target
http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 1092 msedge.exe 1092 msedge.exe 3728 identity_helper.exe 3728 identity_helper.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4384 1092 msedge.exe 31 PID 1092 wrote to memory of 4384 1092 msedge.exe 31 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 4040 1092 msedge.exe 87 PID 1092 wrote to memory of 3004 1092 msedge.exe 88 PID 1092 wrote to memory of 3004 1092 msedge.exe 88 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89 PID 1092 wrote to memory of 440 1092 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfe0946f8,0x7ffcfe094708,0x7ffcfe0947182⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6923551439481869231,4925444561509403529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a9a47fe3fa6709c4ebb1d6445d89502d
SHA1f4d8c72fbb6b5bb390952a2146311acfe3e4fd30
SHA25695ba0093fa4009767bb10861412e20c5cb22be9db950b0c2d6c788b06b184373
SHA512a8bf11c541bdb185c72f37ffd25c0fc9521315d7514dbcdb7def44c93810a0f26e1bc3b2ef944e40316e86cf3849d70df36cda1be60defdaa5d0421bd5988dd2
-
Filesize
393B
MD581247c6851eaf9e526f98b1ae88f90ef
SHA1045d2ddd0d99c212c4140c6ca1e69cb2e5c2f346
SHA25696a7715e3d059f9a0c058a577ea62219ce51291e82e41a0f65fa58c9acdc9841
SHA5125cc0dd5da434c8b9b25c05d56ef7379775eba84661d12a4620e1372fa2fdb44c8728b2fa1574fbe1760831e71ddddef4b9b65c68f175802149993d8393af0065
-
Filesize
6KB
MD51de1e447450db65b7091265032e1d541
SHA1a188781bb200b121e7a0259085c1ed7bce4fb8f1
SHA2562a4bfc9150cb53db4517e4b19d93fa5f34734f5e832f2df12e88e0beeb149951
SHA512d07201dd4582603ee41bcde96e4fd25f41fa91383f6a64e268d75bc0c74121bcad7fd895ee06fac8d65f94903f8eb7764b3a36e41b79fe7eeb30330a218543de
-
Filesize
6KB
MD5b408d4541b82504233be020a52e57134
SHA1688648f185683cc2e532a4759e86a71e12b25e06
SHA2566a4762de67ef5cec66fe9d1bde5240df4cfc0a578d910deefb52f694c80b94ab
SHA512ac780cdfbc7fb0d5c0886c9bda13003b925da6848cee9a3a55e4d7038ce154ef4e8f1c6fce2d14310369916f445585d99de13f07e98dd979f6dacf53f6eeb3d3
-
Filesize
6KB
MD52399b20a3f103b868d63ee4c3c31650a
SHA19aa81e11003b652d281abf744a43a8064683e6fe
SHA2563ea866e3b6e56812418c6bfcb672fbc825585428fa2a73634b9b4146ffa532a0
SHA512fdb13f6ad63948ee0382a6aa57aa7773f0c2abc59cd6bf25a12bc516ffa9e5cc06b54140bc8543ee0061245692bf276ef72ebe19158599dc6baf7921ec502f1e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD514b7063b410c40efe94e890946ef203c
SHA11f2165cbb0d946563cba1dde5009b20a33ed5480
SHA25649beb53dc588b991a3fb8f8b894a604c952bc37896ebdaddfe2de9cba06dfe07
SHA5120faffef71fe1585e166ff83e680e81c3f59c8adb145f22bde72419a4ac3a1eb196f5d0800a03d45e76c019d36960a2cbd9d36329675e0a6aeb51af80ef557849