Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 20:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stresserst.su/
Resource
win10v2004-20240226-en
General
-
Target
https://stresserst.su/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3224 msedge.exe 3224 msedge.exe 876 identity_helper.exe 876 identity_helper.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3104 3224 msedge.exe 90 PID 3224 wrote to memory of 3104 3224 msedge.exe 90 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3120 3224 msedge.exe 91 PID 3224 wrote to memory of 3092 3224 msedge.exe 92 PID 3224 wrote to memory of 3092 3224 msedge.exe 92 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93 PID 3224 wrote to memory of 1264 3224 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stresserst.su/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff838b946f8,0x7ff838b94708,0x7ff838b947182⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6191610083141736983,2333065654412781934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD506e802a7867ee8ccd21405f8617c2e83
SHA1af8f7a9fa7bacb9d7dd356c1457663d65ce095d0
SHA25613cb5000db374ba296e92652c520105a6448aab95ac9233fd15767cd7a1a7f52
SHA5129bdc4e300da309de89256edeca77ea19988fbe453617f775ad901d199dd95b44518ab467125759ced4ed5a59fd153af1f56ecffa0a1ebe66e6b72100c6c4ec6c
-
Filesize
808B
MD55dd4bd0b6ed1770873dcf9c6b6ef9fcf
SHA12433e460047487a16546e627537dd3da8e55db2e
SHA2565d941907ad05e9ac78176835f600d8db48d2da7184c75efaee53aa63f996b134
SHA5120512eb7f2f50892dd9b0bd32a4673f81add0c807f8f4a3149cf21f359d13def078da448608ebdd9bfaf03828b419247a5d04d4da60050dd1573a03a93332c5a5
-
Filesize
6KB
MD58fb65c883d7be92b58ed1f787c394277
SHA118ee2d4657b625abcfcae721ea279299249f982b
SHA256731261c4d12f61eb90f189cca5e319bb1dfc28b38adf30dabe206dce99b609d4
SHA5129d726b96fe66d5cc2234386fd60358ac8eb225a5b4c55359766f1e97316684db815e0e2edfb8204584a77a91c3b34a316c59362a15f6e30c55035f6f50892485
-
Filesize
6KB
MD5b70e25514e5b6506ed74c937e738fb71
SHA1ee82fcb7661b907ce0301612cc258a43d9c0d8a7
SHA25652c188350763146ba37060851fed247b2c7c77bc0a384e7195d6b60dd8526170
SHA512c719f80650e0d0fbc2ecd09f35c5eb8030f3de20bec86fc39cf59f2a6dce91e5f046686bab9a1b941920f55434ddb96b75360b514fabe70108b9bf1b93af806b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d575a92b4c4cc4799b86c5be820809d3
SHA1b15e839aa2cbf1f5fbeb307fb3c378f5d3f4c567
SHA256837d1f0c12242a07d3c21dbfcf755a0852864b3832141958130044e1398afad2
SHA51269fd23407d421718f04b871ea25d9199db34e8118c4814257e5fbb035af72843c13467a7460407b4935b2e877651096f50a09537663d926f47a7314fcee37cd2
-
Filesize
11KB
MD5951efe35a8d1b54e53f4f5ceb0d0bf0d
SHA11cc2ada0b53d34e06509987a796e1edfd5496c09
SHA256a06105bdaa059e3d242b440a3d89d3a4121993aa7967dc386e8ee769116fc66a
SHA512e1ab8bc6e0fddb067693bd3412c6746a65914f509d4901c2a15c5e219b4a597f94fa85cbc7cf278d95c906fc0f16ec984bb7219a99aa8f1f90cf6d50f27f159f