Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
error.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
error.js
Resource
win10v2004-20240226-en
General
-
Target
error.js
-
Size
36KB
-
MD5
c306b3ad533b5f19fd72ae4ce0a38418
-
SHA1
e3e5a2e8e7dfb70a96859fca171e75390e7e8029
-
SHA256
99d2dc6f97476fdcebb3710bc68e0b40fd3d7f57ed2757d7011371a4d45908f5
-
SHA512
8d60d970291a49569f7718a2b4bdc31015d0f9d0ae63d191753a9df7047ede9d8e3bca1b1d278f91421d3855bc8e691ed5567b683fc6ffe8587bd5f20f36eec6
-
SSDEEP
768:c1qO/gSecur8rddY4sQ0Vsk3YIuW5I2OhqAf:ccO/gSeOq4m1YIW2OcAf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 5028 msedge.exe 5028 msedge.exe 2032 identity_helper.exe 2032 identity_helper.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2396 5028 msedge.exe 97 PID 5028 wrote to memory of 2396 5028 msedge.exe 97 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 5096 5028 msedge.exe 99 PID 5028 wrote to memory of 1764 5028 msedge.exe 98 PID 5028 wrote to memory of 1764 5028 msedge.exe 98 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100 PID 5028 wrote to memory of 2360 5028 msedge.exe 100
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\error.js1⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff9f00146f8,0x7ff9f0014708,0x7ff9f00147182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,96305140799385935,13370627379781675094,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
6KB
MD5c7239082931558e03e13acc0eb269724
SHA16d6347525d12e0d316f91dae604f0a8b18835903
SHA256a2c74c21d2fe158b34c1d6eaa1cf558a4235f32417dbf80f89e1cc95ba93f537
SHA512e93030b46e6ee59dedd81db3583b86e9f7932bb4fd43acdb0051c321bd3255400d978b238d8cd835abb5c41b179ed90bacd55fe09197cd824cb31c6df0250f7e
-
Filesize
6KB
MD5b345be9702fe2a3d18d6431a87ff1c3e
SHA1369e94be7a12e463fc2bc39e6d044b58aa68328b
SHA256b0833d438a7bebdc1da170b8d1ddbbb67f68d456a5de711c30d474d412d16c98
SHA51241d471e255a6b97c6e85936de060a6eeb9833346a8779d8de2f3128ff70d58f8ce595298583d909cf027a61820cffc3efdd452efb1d7c42eb4b0af6882689c30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b43a3d9c4a76f533e1fb6947ad925687
SHA1eda1da30b2e5b8618cf377bf3f4d3bceac6eade8
SHA25604ae8c0bcc9dcb79a7ce450248f8c7d62fa53b4cbac28401dbf15a1e4d55011b
SHA5126e0694bb1845f6e28bf38df6618e5cc0754f2b74c3ed3f282352380651879cef89a5718134e6f41d001ee519a8ceed5f1a011fee378d8b3deb69696417355769