Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-03-2024 23:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ksth.ovh/VM2PfGx
Resource
win11-20240221-en
General
-
Target
https://ksth.ovh/VM2PfGx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 768 msedge.exe 768 msedge.exe 4916 msedge.exe 4916 msedge.exe 4008 identity_helper.exe 4008 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 2988 768 msedge.exe 79 PID 768 wrote to memory of 2988 768 msedge.exe 79 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1436 768 msedge.exe 81 PID 768 wrote to memory of 1788 768 msedge.exe 82 PID 768 wrote to memory of 1788 768 msedge.exe 82 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83 PID 768 wrote to memory of 1104 768 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ksth.ovh/VM2PfGx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8952d3cb8,0x7ff8952d3cc8,0x7ff8952d3cd82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,1452235713183409794,1120081489105902775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5341f6b71eb8fcb1e52a749a673b2819c
SHA16c81b6acb3ce5f64180cb58a6aae927b882f4109
SHA25657934852f04cef38bb4acbe4407f707f137fada0c36bab71b2cdfd58cc030a29
SHA51257ecaa087bc5626752f89501c635a2da8404dbda89260895910a9cc31203e15095eba2e1ce9eee1481f02a43d0df77b75cb9b0d77a3bc3b894fdd1cf0f6ce6f9
-
Filesize
152B
MD588e9aaca62aa2aed293699f139d7e7e1
SHA109d9ccfbdff9680366291d5d1bc311b0b56a05e9
SHA25627dcdb1cddab5d56ac53cff93489038de93f61b5504f8595b1eb2d3124bbc12c
SHA512d90dabe34504dde422f5f6dec87851af8f4849f521759a768dfa0a38f50827b099dfde256d8f8467460c289bdb168358b2678772b8b49418c23b882ba21d4793
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5bc069a0ab9260fe87552571f4641a478
SHA1f6fef408926be82b70a9b76919e074bff47cccfd
SHA25668d528cdce39f6be7286d2353f171e464c84550230e13270ed6afb85244e2fce
SHA512377348dea05ab9a183eb03c7e6b2f770c723b2212cc9500c596896b37da773e6673730b9d225c82f06ab7af24d8b234cf8646973f6ba8bb244177f2fd8536e9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD56fb9e1bc95075ecf67268456d7fad394
SHA197755ea50b857a9bd9375e76770763490fcea755
SHA2569ad9d64c944b85e7a014294f374612e8ba7ce1287e89e9494294598b9d04caf2
SHA512b19115a12e94440e20b9ba4b390392b6451494147d3325de26fbc3b44904dc824521dd7345a059baff4befcb9410d5667c72904e72bc0f0e219dd8d7513c1c50
-
Filesize
1KB
MD5f4ac6cdb2e95ba4200f0f6830fdb4a06
SHA11efc8722584ad0f6a4d10505e7c3cd69d36e2675
SHA256847d870ba6472dd2c42eea43bb2c3fc1ddb821a6b2ef91fdae5256d851d206e0
SHA512a753eb1f05019faf6a3674b62eea67c380b8db9e3e5eb5894b22c21df0f70d79ea427c94a59226eaedf1a1e5a7ee6cd7434d29734f8b5ea862f53b6f686b9c1a
-
Filesize
5KB
MD5dd2730053247f12b507b879090ed4dd0
SHA18773f5e8b6a263e3d33ae8f02c88edc4f0c22bf3
SHA2560cec4b3fa60107c49bafeddcee710e784931a5424ea637db9526a3260436723c
SHA5129246d50f7eeae8fc3b6e73056b66e272e43dd1080617cbbe04e887decf50639853f7b8bbf4a02e2aa11151c68cfa9b2e0a6ee57612a92d08c6961150fa78a43b
-
Filesize
6KB
MD5cc3423dd98b84b6eb88c4c2f8fd6e550
SHA16fad393cdfd6cf2c8b65d0c0c4001bd2663042f6
SHA256145101c116205cd9ecfc53f1cada9b19789f6960753f799ec161035ca8788573
SHA51266c52054ed499076d061f16866299b12e8e3f995541a7fb68dba2a793947d6c5d2f219d2de29c4096fe35d8d65860404f3611fdb14f2c6bef33ad93bc9428bca
-
Filesize
6KB
MD5162d4444bf444163b0220e7d528fc997
SHA1bb6ffb2bd6c523d62cc2c9f16af84b5212c11e7a
SHA256399abeb3bf6bd675238cee292dda92427a41ba0b3498ad705e6fc928432b1493
SHA5121e4c95e1ea78032959b19fabecc28906b85b44b1fd9ca93b48b20e31df9332258ae094ff4ce9cfe834e5424dc6f0756ac9a4f40db3b3ea2a95412112a0cfac50
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5e726ac778a3d9c3c72ad2a2b193431e6
SHA1c7a2d03525734b13bcb9d2586941e943b0233e01
SHA2565deb75db4fef444271be92bab1d400dfcaa31c42a7fe85257a6a55782f6aa48f
SHA5129a8490ce591ac74312020b386e7240d1fe327af2c9c3a3621034c5a5b2cbef4e7c57baa92bc0c0f6a55fe455a58c5c7ed4d727a491b9ba237dddac98ac8abdc8
-
Filesize
11KB
MD575184696248d6b096b71fee770b5dfb6
SHA164dc8a7405a6e4b6ee50d52e692a5ad6061ce2cf
SHA2567cb6feb8fef41e15fede4ff654828f99ee7c058f973ff03ea5e1de33bb6660b0
SHA512637bc2aeee19285b315552f04575d690302a83f78d91901b86e1282652514ada19ceffec542637b727237b4e311285df4ca25c643b01a909c2f3d422140616f4