Resubmissions
28/02/2024, 02:29
240228-cyn5fshb4v 828/02/2024, 02:26
240228-cwvjfshb62 128/02/2024, 02:22
240228-ct1bxshb27 1Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 02:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://C:\Windows\system32\sethc.exe
Resource
win10v2004-20240226-en
General
-
Target
http://C:\Windows\system32\sethc.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 4556 msedge.exe 4556 msedge.exe 2208 identity_helper.exe 2208 identity_helper.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1604 4556 msedge.exe 68 PID 4556 wrote to memory of 1604 4556 msedge.exe 68 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 3756 4556 msedge.exe 90 PID 4556 wrote to memory of 1300 4556 msedge.exe 88 PID 4556 wrote to memory of 1300 4556 msedge.exe 88 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89 PID 4556 wrote to memory of 3980 4556 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://C:\Windows\system32\sethc.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb62047182⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18064579051523978829,1452464812101896465,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5654d261e7148c085c6a620c757395d9b
SHA1d7f1e6df0e8644d745e76e984e2132b0c300db90
SHA2567570074f4e16e76ade897f80178c840b864a8e00eb743343d5464d920cf7c12d
SHA512f480d355532b4abda5fbb028dddc2c8037423aa6f8c30bbb20718d8454ed7d8e18fd91f5c8fc675ee3af85f7717faeb31315ddc22c2c9fb228e8546c9d6787d4
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD52208c3ca9828a36b4d9de704b7319b42
SHA1a206784a10d2e270d3227f843fe60e7bcf2c100f
SHA256ddb0e004258fea30151d07b71be48c434853d6da2ea6e1be6255ed77413bf826
SHA512c9ba9175546ed9399b2ed8f3204af88c1b40fa462f68f9173c3bd5929929d2533a971de91c94bc8cae066fa20467626d425e92ff4a71afc5f53e7a1e40781a20
-
Filesize
6KB
MD5ae20b9e6970c995160fd844bdf80bcdb
SHA1ccc73e8f083848ae35cfc85a628d2c14f95d6a63
SHA256bca7ba25d27bf9e0ede61d9faf235b5b379a87f45d10e4ed37b32896cf671a76
SHA5127b1897db17e61fad28f21893b6b88e20cf7df4f9e5bc470689b582737d30132e9f8e69885b5896e825250f9a69f4d1df810c3e7d2fd67d6e2e20ed8fefa7e607
-
Filesize
6KB
MD5700f93ffbc09125aeb8546f90c3fde50
SHA1f9d1753b92303d94297a93cc2bbf50e3857eec0c
SHA25613d2bd440f893948aee6cac283bf8a18d16dd00c5a03f6e99646515d1b57e297
SHA512f3f8cc061138fbde1ff234d9f1d338fe6575082679945dc0758cfb3409630acd7a3b02175622543368c0a3e41fbe193c4795a594a38cdfb82bbd135bea536d12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e356caae-e38e-4ee8-a480-5d25d35ccd3c.tmp
Filesize6KB
MD5f9187906a529f21714cb6e7f13225ab2
SHA1680677d6a4bca7f7d8d8998e78051ae6c0787975
SHA2567e46240b191cd6ff6e931bb3224995e4f175e9b76c5c4d03d6788a04f460b45a
SHA51270337c696a239bd92d4af4848a3476359c17feff192785ebdc8dda0a9b771cf410146ff3e39fc1b65792a5e9eb58c17a087769e049f8bf1ca8778a0007a69446
-
Filesize
12KB
MD5147e3873440228ed27f4fb6bb784941b
SHA141ba07de819e24176c94e26ae32fdb0845e791b9
SHA256c73696c5139f25d1c3fcea549740dfb789f975b61c222019791f5a9257437e94
SHA512ab6f6119b701ecfacab437aebff3ebc479a225b8406e0108c883cefe52e55f09356d944faafac44d8f85e58b243f1b85364c47e5d43f328f11ed96d794b8cdfe