Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/03/2024, 23:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://khian11.com/vb/54edfr5.html
Resource
win11-20240221-en
General
-
Target
https://khian11.com/vb/54edfr5.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 2024 msedge.exe 2024 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe 2152 msedge.exe 2152 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4848 2024 msedge.exe 80 PID 2024 wrote to memory of 4848 2024 msedge.exe 80 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 3012 2024 msedge.exe 82 PID 2024 wrote to memory of 4976 2024 msedge.exe 83 PID 2024 wrote to memory of 4976 2024 msedge.exe 83 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84 PID 2024 wrote to memory of 3740 2024 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://khian11.com/vb/54edfr5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff841eb3cb8,0x7ff841eb3cc8,0x7ff841eb3cd82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,14175969705306066959,10285406800822446570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d459a8c16562fb3f4b1d7cadaca620aa
SHA17810bf83e8c362e0c69298e8c16964ed48a90d3a
SHA256fa31bc49a2f9af06d325871104e36dd69bfe3847cd521059b62461a92912331a
SHA51235cb00c21908e1332c3439af1ec9867c81befcc4792248ee392080b455b1f5ce2b0c0c2415e344d91537469b5eb72f330b79feb7e8a86eeb6cf41ec5be5dfd2f
-
Filesize
152B
MD5656bb397c72d15efa159441f116440a6
SHA15b57747d6fdd99160af6d3e580114dbbd351921f
SHA256770ed0fcd22783f60407cdc55b5998b08e37b3e06efb3d1168ffed8768751fab
SHA5125923db1d102f99d0b29d60916b183b92e6be12cc55733998d3da36d796d6158c76e385cef320ec0e9afa242a42bfb596f7233b60b548f719f7d41cb8f404e73c
-
Filesize
179B
MD5015fc5b73ca572c70e8e44951623fedc
SHA199aaff985270cd424126e1c53025eb6ab9ff1b50
SHA256def6ea12c3928a7d5bbdae1a385081f43664b31bccc1cbc74946497e759a9e98
SHA51275745850243a8b991264f0ee769f34afa58d3f7a1ab3b8c9e7a31bd75e9646974090e760702f3f0ba76a8680fd391b8a0b8601db80fef471e908b6b5e7944af0
-
Filesize
5KB
MD5e0331cee1c436526f9f08e35a7fd978e
SHA141813733a4611677b10987f8d5afa7d78fe929ab
SHA2560abc2136ab82dbc00dc64dde100b26f254e6a2f6352920e57771d2569d43cc25
SHA512d0fa95508435fa16259401a44426e912bdedc57a0857c75b84bfbd492e0640297470a862c442dd436d9c0d5359fc7a62f3b6fb7d028602cfc647a919299105f4
-
Filesize
6KB
MD5f8e63e4435325e814d73bede60cc040b
SHA186ee36049252c864378d911b3197ebfabb8c4eb3
SHA256ebe4725895ecba3895a0461d9527275059a21811ca2689bfe7c6e049aee5b697
SHA512b9c8ccfbea4f4ab315614fafc0194adaee6292f77a0544d3d2d9b2dfef602b6c45e724f03d2ebc460915461fb053316a4c8edd9517851bea4f4fd077a4f0149a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c797a9b1fb481d20b5727a12ee6087cd
SHA1c9a94a8eff36fa6c7c686fb0130da5559bd5c968
SHA256b6fb533e7e758a67921f75953a0b329fe9e89e4f854f412572cd7f744144b586
SHA5120b4be7812a42c396d080b104fc3675a7a21474ca87c761fe363aa1a3a16394934b705e084c4e1d7a555f2416d79acc45000ac57ad3eb8ab66a943a94f5cfcc5a