Analysis
-
max time kernel
254s -
max time network
288s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 10:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://3.71.111.155/login
Resource
win11-20240221-en
General
-
Target
https://3.71.111.155/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2468 msedge.exe 2468 msedge.exe 3208 identity_helper.exe 3208 identity_helper.exe 1596 msedge.exe 1596 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3708 2468 msedge.exe 79 PID 2468 wrote to memory of 3708 2468 msedge.exe 79 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 1376 2468 msedge.exe 80 PID 2468 wrote to memory of 2268 2468 msedge.exe 81 PID 2468 wrote to memory of 2268 2468 msedge.exe 81 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82 PID 2468 wrote to memory of 3132 2468 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://3.71.111.155/login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xdc,0x118,0x7ffb74373cb8,0x7ffb74373cc8,0x7ffb74373cd82⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,16712525081633072419,15309942274375327434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55c48e8b68231fb5b2d7f1188b930bc0e
SHA11822aef5da8fdd47626fb91afcf79a2be175a325
SHA256c3b287c29eaa57166b2ab1ba9bd0aaced13cc2f946a04b8d708ac429187fe944
SHA5122bd09b83e44e0104fbe080a8573690217dc9fbf7fd59ff25a1a9e9ebd2d87ac533f9b99350773d081a7e748b39657115a13e94538b153bceb13ecdfc4672a0f8
-
Filesize
152B
MD5f2dc80f5403feb8461b7ffa09890d6a0
SHA1d5b61e6d672e7e71571e0132e21cead181da8805
SHA256eadeadba37eed18e5acba408d7e076270b00403fed372b77164577232232428a
SHA5125e2119529b99b76be105c43714e4b9977ee2147172c1c44e92bd9b41fa7a66f55d4073c864aac668a912aff2898bd216fb38f2fe34ef65de69ad12965218caf5
-
Filesize
5KB
MD5ff0336fa9df8b763afe06b76d3504d35
SHA11f942502eaf8005fab099890d35b30cf38326987
SHA25663bd5ff1a3e833d2067d86c5acea23cd60706be01527a76687586163518c667c
SHA512ef84dfe52122dcaeac783f9a6ee6b717c5c7df687ca36aefcd684a83eccbdc79e5dec10891056897126d2f3947932957dba9b4754f35d0c9637c47fd9821d55e
-
Filesize
5KB
MD5db1c3cc9986ae589038b3bf1d0edd0ff
SHA161da543863319830199c4e5aafc9ea5d09e1ae3a
SHA25697c3a7c28bec33581d7fcd028f930cc898086a0e9889eb5029940fc519eae1ad
SHA512f99a0b22f7c0d23c7aa648013ed5f77696d1a1e09d18a6d9a4650d583f34675a57779610fa235ed4461d115e5073444b9a1253f1659bc8780144e49abe8c90f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD506b14f2e3af83c5f3635df478457e6da
SHA1e3374d3d16edaac1e3e0c150be03c14da26dac0e
SHA25694cf775d4c220fc09ff80bde35f9dc3dc99e9780a641aade3ec0c69c5a3133bb
SHA51252c8e756ca7d52cb20e36c60cc48919cdfcea89ac172cb26dc070204aa5781174f48e31f5f0cbde056a6c44dffabe424d3ccc8f3401f5504197f883b8ded2de1
-
Filesize
11KB
MD568e57b4885210e8b29ae7f57218be38f
SHA1ee4e3ad8a376516b8c09ef1b6573beca53e013eb
SHA25698bb90249dc2b623ad36c78acddc71a3aa8a29d093faf3607526cb1e8e4da52d
SHA512e7a56ee4d6132a5bb7b0fc1a1e9e6b5cbf0f36f7ee165f5067557ba5b9e188b7795b9277c8ab3fb60de2e4605913814debff338e98dbb6918135b952a39dc887