Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 05:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mitalibd.com/o8o/lognet.php
Resource
win10v2004-20231215-en
General
-
Target
https://mitalibd.com/o8o/lognet.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 4212 msedge.exe 4212 msedge.exe 1928 identity_helper.exe 1928 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 3328 4212 msedge.exe 84 PID 4212 wrote to memory of 3328 4212 msedge.exe 84 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 2460 4212 msedge.exe 85 PID 4212 wrote to memory of 1496 4212 msedge.exe 86 PID 4212 wrote to memory of 1496 4212 msedge.exe 86 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87 PID 4212 wrote to memory of 3224 4212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mitalibd.com/o8o/lognet.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe963946f8,0x7ffe96394708,0x7ffe963947182⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3088 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10059548974830923487,16414753171070016735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50af8aaaf2854fd5499ce73102e6828ee
SHA1419f3ed2ada1bbc9528a36b350bcce12c9035392
SHA2563165c01bed5acc8b943012e99f913fa1308aa3c6024a4c47a115924ef022e281
SHA512d40d3fa4791dc8adfcaadf6f5c69a7ad2b54b59e44fc2b6cb460b545297830b0e8c026ee1173ed0938480767528e1a953e81f8529222cb26e9e7b71ef743394c
-
Filesize
5KB
MD55f884be9f56ef7928d254148ef85a9f1
SHA1deddbcd87a79a83dd16f54527c76d18f46cf9232
SHA256aa1ea296bf5a24f0ab8487b1e720191b83b5199d468a985ceda4cc719c9f8905
SHA512b28ef31e03c90fa3b6a2f9a8214873454e8fa39ea678f3de504084625bd4d71cbbbc6ddcfefe94c1171e5d4e60fbade5c8693398bbb8a4d152fc6a32ad64af29
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51353ec4f0f9b9cfaa2e0f3ac561eb9cb
SHA1c12fad2f3280ecbad5883982a392b199382bc0c0
SHA25696171cc93efbbc796ce164707efc8379ebc4ebb222be196fc8878795b06c9345
SHA51265d057e375d1d8c6424e7786dd2d8c2eb26a6c7bb7371497109f6e6064a1ab88f62ad798801d339abf297f52b5f66c7b24cc6e1edbebbff2ac06a0b29563a8d7