Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 08:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://freenitro.org
Resource
win10v2004-20240226-en
General
-
Target
https://freenitro.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 3160 msedge.exe 3160 msedge.exe 3868 identity_helper.exe 3868 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3924 3160 msedge.exe 89 PID 3160 wrote to memory of 3924 3160 msedge.exe 89 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 4476 3160 msedge.exe 90 PID 3160 wrote to memory of 2524 3160 msedge.exe 91 PID 3160 wrote to memory of 2524 3160 msedge.exe 91 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92 PID 3160 wrote to memory of 3332 3160 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://freenitro.org1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb073646f8,0x7ffb07364708,0x7ffb073647182⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1697269430103319505,12531229985474569130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:5164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD5068f92f9b936d8b8d6618c614f8a9355
SHA1ced0b8d45a3a1d7069eec50da8e2c0ee9c893dc4
SHA2564138122da62dce596f460efa05818820d005241221b25cc23cfae92d9c05d152
SHA512f6c9c3dd690a58b6061bab01f65098dfcc1c32e2201d7929445389da98f84948afb501435a15f0ca739e79833208c35a9236a57f48086093f01e8474972ee983
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a2cc17ed-00f3-4788-aabe-8e511ce2a4c0.tmp
Filesize6KB
MD5d7978b73ac120959dc0854dd65f651f0
SHA1648bcd035ed4bba51de86f93172b6ddf7f207c39
SHA256c5b0ed1a8425cf26446a3333b33e8259b1831cddc05f920eb832ad62a1334af2
SHA5128ca68f754e78ebdb8b39e9ac26d550f0bbd17520ac7b2d3ed8fce2624b6c9b1ffe5c00d729bff06777a431a22f5b2d4c8864b1a31e5c8ad61ada39b0d52b722b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50c6ad69707f5c036ff3ce8bb8d1f2131
SHA1908d81ee4db64fcfc0ca262ea6e0ffe795ae4257
SHA256c94f8bc2469bc69abc021870502a3eb0a3f68ac68936cf804b399d5b34263f36
SHA51290bb6b9016da6d7c2b75429018c4a2d0164c433b8962ec61977b6131d684fa6c815d469a174d34bc3a8146b079713723e81b058ab095bc17c03a3616ce90caaa