Overview
overview
3Static
static
1Connections/wxbbs.vbs
windows7-x64
1Connections/wxbbs.vbs
windows10-2004-x64
1admin.asp
windows7-x64
3admin.asp
windows10-2004-x64
3askly.asp
windows7-x64
3askly.asp
windows10-2004-x64
3checkcode.vbs
windows7-x64
1checkcode.vbs
windows10-2004-x64
1default.asp
windows7-x64
3default.asp
windows10-2004-x64
3delly.asp
windows7-x64
3delly.asp
windows10-2004-x64
3face.htm
windows7-x64
1face.htm
windows10-2004-x64
1images/krId.js
windows7-x64
1images/krId.js
windows10-2004-x64
1lybook.asp
windows7-x64
3lybook.asp
windows10-2004-x64
3pass.asp
windows7-x64
3pass.asp
windows10-2004-x64
3新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Connections/wxbbs.vbs
windows7-x64
1Connections/wxbbs.vbs
windows10-2004-x64
1admin.asp
windows7-x64
3admin.asp
windows10-2004-x64
3askly.asp
windows7-x64
3askly.asp
windows10-2004-x64
3checkcode.vbs
windows7-x64
1checkcode.vbs
windows10-2004-x64
1default.asp
windows7-x64
3default.asp
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
Connections/wxbbs.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Connections/wxbbs.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
admin.asp
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
admin.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
askly.asp
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
askly.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
checkcode.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
checkcode.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
default.asp
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
default.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
delly.asp
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
delly.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
face.htm
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
face.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
images/krId.js
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
images/krId.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
lybook.asp
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
lybook.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
pass.asp
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
pass.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
新云软件.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Connections/wxbbs.vbs
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Connections/wxbbs.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
admin.asp
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
admin.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
askly.asp
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
askly.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
checkcode.vbs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
checkcode.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
default.asp
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
default.asp
Resource
win10v2004-20240226-en
General
-
Target
face.htm
-
Size
4KB
-
MD5
0bf45c04650a4a77bf67f70f3ecb726a
-
SHA1
330f59a33ddd85706fcf07df314f0f08f07d2355
-
SHA256
f0d24286487dda6c9de8278c546cfe1cadeed28b74a4d898a31e2409a9925e80
-
SHA512
9c9f51ca5cb417fb2231f101a9b2581e6c6bffbc4406aa2c67ae3c93bf171d6f788e348757b0558903cf62e861429a12318ec9a567109566fb62dbf176aa49be
-
SSDEEP
48:qvI28EYV0Aq8xf6Xlxy5OSer/LNJxO1TNerGa/Ve/vZ0rL:e8EK1/sDjcHHqrL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3656 msedge.exe 3656 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3956 3656 msedge.exe 89 PID 3656 wrote to memory of 3956 3656 msedge.exe 89 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 4988 3656 msedge.exe 90 PID 3656 wrote to memory of 3364 3656 msedge.exe 91 PID 3656 wrote to memory of 3364 3656 msedge.exe 91 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92 PID 3656 wrote to memory of 2796 3656 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\face.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf27e46f8,0x7ffdf27e4708,0x7ffdf27e47182⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11701330485984822523,401389558149862292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD589f339838e21b74a76ba4e37e697a788
SHA17e55ee21313bb3f693e3848be4b57357c5b439d4
SHA256424d5c23689779676287b9841424ef1d38506cb4514dd3066be26d179e324521
SHA512a631920e9e0719accd9590bd494d76cc8b9202e649efb5fb7d5812dabddd5132cacd20f26e37bac6aa9843df5b5f9d042c90718562b6e047c3d20fbf7f406b73
-
Filesize
6KB
MD5e85c0dd6db5dbcb3c8d0e315165e5a7c
SHA1f4b360246d0306962ffa9867f793987a1af4d460
SHA25690c7652ff3f2b8bb551ce2a94e72be6eefee6c65e0b892d9fbc90b8c093d00ba
SHA5121f5d5cac6ab72502a79d1bd0a4cd6c734611465b8809f9efda3f42beeda490100270f430d63b8c441ac832ef94a5dcda0143633a1867b04ef006805d83f4290b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f438e6adb0cf800357ebd73f2cc52ba
SHA1f2323cb88f678e3e1449342b2ef5dcd36333dbf2
SHA256f0648b5bb8a840acac23592564d2dc1a31bb84e8fdf4c064476db0ffd9b0ac50
SHA512cfe71ce6e9bbe2480a4c076581bdb3bd9b6f672000e6e206494ee00854cd0e3ee774d162f8cdaebbf46af784a0540b396a335557e48e86377120494d579ab9d9