Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://p2a.co/ThX03FT
Resource
win10v2004-20240226-en
General
-
Target
https://p2a.co/ThX03FT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 4008 msedge.exe 4008 msedge.exe 1084 identity_helper.exe 1084 identity_helper.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 392 4008 msedge.exe 88 PID 4008 wrote to memory of 392 4008 msedge.exe 88 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 2908 4008 msedge.exe 89 PID 4008 wrote to memory of 3036 4008 msedge.exe 90 PID 4008 wrote to memory of 3036 4008 msedge.exe 90 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91 PID 4008 wrote to memory of 3832 4008 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://p2a.co/ThX03FT1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec85f46f8,0x7ffec85f4708,0x7ffec85f47182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1455058921520040236,16158393909436864544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD54f95ec02a4a00792c7b2a41b05e13ec9
SHA1717927f025ed1a900a0cef320a0d9cccee815096
SHA256838ccb8a4ee953a6a9e579ba5ce6b5bea89eb8f2d5bce9272f441a8b4ce9ca9d
SHA512aceb75d1886d44faa28b05906548f4ce4a9d923d082dd66182b623580727950a76ca12f5865b6c7dfdf4475d3fea51c3280bbaea70124318139e6e4e1d4105da
-
Filesize
1KB
MD569fee0c3ce626d5a64f49b3438a91641
SHA12a16ac0b227c820e16e93a29257ea129b1d61607
SHA256868603bdb1e668cf7e6f4efe464cb128de1ae2ef04c9610fb0781a831dfedfd0
SHA51299676ac21c605e5a8c7064e51f6592f671635d118583f7d63fe24bcf8bb0e9503b1ea78f69a30e2c8eb2d14747341b1e0586f341404a08a7f7514dc0f34f62ad
-
Filesize
6KB
MD54f4a154bdd43471c0a2f1441408551cb
SHA1b5b34dbdafbc7d2501921a881dcd34ce5b5cd8f5
SHA256bb9acc755d5b5cd17218ee17be9056a6399ca04805447c95a99e56bbfc3f9921
SHA5122fd950ca2f0f77d3c8e0d4fbf9f1d58841a3d1b0be7961aee41a5cdbaefae94675a414464713205cef13f7b41e9eae503fd9372eb6edc73f6b9239c36dac3199
-
Filesize
6KB
MD58d6f54253359036aa9ca28c5001c2bc7
SHA1b4b875b03aae8bbd5547f4831fa2b3585e549f67
SHA256e272ef729fbceba54513a665b2b7a3a0ebd8a50d0eba1409dfbf8ca4f9c6ad2f
SHA51210f7543f96b54ae5eebb286f2dcd458cfb77f24b2436718c06de33984115c0708249d40b76f62f7044aa785af60668d72b263486dcb3e6adaeed00152da9ea2a
-
Filesize
6KB
MD59229c3e3ec1bb27a1a16e31fdfbd4369
SHA158df1c33beea9a0868620bea114e30b91bdc8d19
SHA256fd897ff707c41a9b2b6ddbb2f4413be17b98346ac48d9c17b979327f9ec99d4b
SHA512cef1bb5c870d62b7f365525bcf754110b7689f6be1b0e20ee62ae75e98e6b0208f519f071059a8c13e10b0c91aa9a5620fa2d61e7561b3d93473cb2c4f3ec40b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fa066f35b5d2404221b0e59906e9d9b1
SHA13ea35c8b472288458a830088ef98e85b644d08d2
SHA256d7875b95fa58133886fd5c9696714a04c9ca6339da9c057354cb80ca2c3f7aa3
SHA512a45c04fe7747574acd7c701164c6f57aa1a5c3bfa070bd4b89196ecd4d4b20a764aa5d835b316ab38bcafbb23723c296121cb1dffaef19fca6c9d086478dac30