Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://4343w.jgu0.com
Resource
win10v2004-20240226-en
General
-
Target
http://4343w.jgu0.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 856 msedge.exe 856 msedge.exe 4108 msedge.exe 4108 msedge.exe 4592 identity_helper.exe 4592 identity_helper.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3896 4108 msedge.exe 88 PID 4108 wrote to memory of 3896 4108 msedge.exe 88 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 5096 4108 msedge.exe 89 PID 4108 wrote to memory of 856 4108 msedge.exe 90 PID 4108 wrote to memory of 856 4108 msedge.exe 90 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91 PID 4108 wrote to memory of 908 4108 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4343w.jgu0.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff01a446f8,0x7fff01a44708,0x7fff01a447182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1464 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6821584604141838495,9762505090288894632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
472B
MD58a0d2d1bac8ce649338b2a82537a7e0d
SHA1fd77069d7599e3059d79dd2e8a9a9b2e7e235de1
SHA2565a8ef23bcdda6ab99bc64526dd45116625264c2317153861fc4e195db8cfcf22
SHA51243337a622184380587a65bc98df97ba4da012e9067650213b2c46b67dc90816bf1b62139b5706d9250237f21efdb7618e1d6a85a54f4fb90e60d9f0b5dc562b3
-
Filesize
6KB
MD5d4aec0021385815fd768c2da2bf29fe7
SHA15cc35657c48969c640dd0d23ba6d316ab84920f6
SHA25687e7d12c1e8b8bb931c9bb52bd25db54cf6b0a4cff4d626a530c02e32b147952
SHA51221201007ab6a6c13911b0953dfd67193b616990c79f19b21b9b6d55eff6d3fe2ac7e63b97e3fa565ffc6dc11e36cf1f267799a3372d2aebe95a54a92328f7b68
-
Filesize
6KB
MD55da19fd4e1d6188168b3373fd6de02f4
SHA11c3ffe38b64b7ea88c03370f4ab71de701eb4f68
SHA256f1906c9b4eee7df784587aa19360b27100ace0f9d5ef666fec83db2b74bf829a
SHA512791fa1cfa23d712759960bde98564659f9cdeef2b3c17636ad1e133132bac4405814bb1ff6fcad70fe66f59314c6217bd4aefc80a8e3c70b8e202fd9d2318d18
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5969f31f71d37fe1f0cd566bc543d5b9b
SHA17538198a8759213eda886f83d9f885e5cc0fb79b
SHA2569ae331e715521fe5655b90c1c99a0db343684610c158079f2a8699dedb9f1b46
SHA51221745f3285b3858e3f4c8e320d9e2a43e80e9ae9e9a27be84a59efa60c8d3ff1325728b1d10ada94156069c26e34c190e16e9b70499732c0d3c83519abf69211