Analysis
-
max time kernel
47s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 16:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://onepiecered.co/s?rYDR
Resource
win10v2004-20240226-en
General
-
Target
https://onepiecered.co/s?rYDR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2736 msedge.exe 2736 msedge.exe 4672 identity_helper.exe 4672 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3176 2736 msedge.exe 90 PID 2736 wrote to memory of 3176 2736 msedge.exe 90 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 4476 2736 msedge.exe 91 PID 2736 wrote to memory of 2348 2736 msedge.exe 92 PID 2736 wrote to memory of 2348 2736 msedge.exe 92 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93 PID 2736 wrote to memory of 4736 2736 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://onepiecered.co/s?rYDR1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd113746f8,0x7ffd11374708,0x7ffd113747182⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3580 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2386019867645890402,1006330820904293773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57e9bde6e33a9096f30eb0506f3c24c4a
SHA1155b322ae76e3a0169118e7542722f8a5c094dca
SHA256697a736b271844089199f9fac60809091616de4ffcf6a0f68347321165c7554f
SHA5124739a75fa529eb1bde4925ab0f2fd20ab7f59fa9c1d8eaad86e7eced9cf2da23a448374931eac4a4f4037037026759fd364c8332d656afc535643ee21f9ec343
-
Filesize
6KB
MD540cfca2f2b84e0dd1b5979df7749dd6b
SHA1a99cf17843466dc7d98d5a8001185babafcd2a1d
SHA25640dacb37ec6ed648118caee3115fe85f036d3b0529920606de06d5fdd5136ce4
SHA512590858f0c807303c0fcce52d965f5574467342b622cba7de2130ad335bad163c45d7338816842736418ee1c04c65976690e1688471f7fcbe871359cd9fb75432
-
Filesize
6KB
MD5b315b20f52ce33aaeb52d448ab1c3145
SHA1f93a72825cf70229fdbcd56117a9998f57aee975
SHA256fcfd34a46010c6943584868a94c7332cbfa847f1104155e6a3a1fb83fccbcae2
SHA5128f0efe4210e6ebc4280d3cc74d16466afab23e4dc0845b18bcafcecb3baa1cd29072443e931c1175d44144fe6bb4a1e30776b8bc7868895be455fd23f5e7094f
-
Filesize
6KB
MD54cffca65607f47af8c6b1d1a6dcbe952
SHA108fa1459cef80b1d6a57d59d7e1a0f106d2696d7
SHA256e27408c45457ae467604c77405d3d315696d8c51d174b54dcfe6b00385a56917
SHA5125394979eef76d259707fea2fcda1aa636f3b3e3517d5ad24d8b89f44098083acf4a6452ae044793a41c91f27292a15be3bc5f178ff5b84dd6b2effc33828d758
-
Filesize
7KB
MD5499a50969bb3270da7439b165b4fab11
SHA1a1ac7824d6fab343d7a25d26904974e52443d38e
SHA256cc010a49930a7ab545433cd56ad5c1b37d7efece68aec46accd32419bc6b121a
SHA5123577bf2ce1c7cd7671671e84ef18bf75003917f70f9485b8b6ca9f58f94d66297a6af7763ef80f138d174732d0c3c7a78ccaf42e5c88bb710cd9837985577097
-
Filesize
539B
MD5b16d905133dd95692470ef80153ab14e
SHA17137058f6703485cd2bcc3b94272da82202fbb09
SHA256892fb8a9d086cbcf6060000f32544bf0a77b4d11084f2f0e8ecf2578555b1375
SHA512e2abd534354b13dd1717c8b24a7cd88612150f791126863336374fff599b501cbf934aba81ef2e37dfbcd9b21411cc66b5eb0bf622ccbf13988d486612bca37d
-
Filesize
874B
MD5638b5044c7b28a6609f6a9d66fbc1e51
SHA14190b50f62892f991e737f70dea3cdcf9c7b59e3
SHA256fee18024e1896f46a498e97ffa5493c9083cc075ee253a606e1d38c4737f9f67
SHA512296260ab26dbd6a1752649a3a10446c7874d269df53c43a650247efdd4b2b885bdf3cc97a5de7855169cf3164cb33ab7cc25d817dc3ac3b2ce7a8083b7afe45e
-
Filesize
204B
MD524410a0715be28a72e71924bfa0ecf5c
SHA1e4e5c8c4c65c55718a63d56fa745652b98abff33
SHA2569c3a6f34d0844e73a30582345d52405354c758822d6723d4659f2ae70f3be1fc
SHA5122aec6739026195a7e644256f3a12b09244ef32029f46c48fc339a282a94f10c540f2099ddf219a730bcaad77dd32c5ea896bf675d67a3ec12f0f15d587205fb1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eac35fccd002de8aacdabe07d17e16a1
SHA1f76951778f4d25175792cf4ae85c18d80c56ed7a
SHA256a53f61c89f2d72bf464cb19c06471beb09817470a5f0cc14c78755a1d994abca
SHA512148d929e6f9c7efe573b5f5d340b848ef0ac2c20b8e7edac2bcb267498988d38fee89eedd668c205ae4e15074c8fe6dd844f2b0ffbb00fff08e3052a36ff5dae