Analysis
-
max time kernel
481s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 20:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://memzvirus.com
Resource
win10v2004-20240226-en
General
-
Target
http://memzvirus.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 4648 msedge.exe 4648 msedge.exe 4508 identity_helper.exe 4508 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5932 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2492 4648 msedge.exe 88 PID 4648 wrote to memory of 2492 4648 msedge.exe 88 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 5060 4648 msedge.exe 89 PID 4648 wrote to memory of 2080 4648 msedge.exe 90 PID 4648 wrote to memory of 2080 4648 msedge.exe 90 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91 PID 4648 wrote to memory of 4208 4648 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://memzvirus.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb2a746f8,0x7ffcb2a74708,0x7ffcb2a747182⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3463576169125221339,16109227311751293364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1072 /prefetch:12⤵PID:5364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD566610486620f0ae757e4b75b615423b6
SHA15a88b47369221f13b2374b3685e5b3743df41f78
SHA256913355c6fad9147d599b9bf6f0c629f277aaadb3bbdd389727ee9a084f6dd3c7
SHA512afd7ee6c069d90085a86d16eb54db08fd12b3db9c493d836f5f120ec8d4fd90c617a7f35dac1562bab32bdf58c94a8fd9efbe6eef7d93fe8647f1a19ec1356a0
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
6KB
MD55b2edd36c0414c246a879b52ada5f715
SHA13478d02b2f769bc38b3bc9cd4640df579d076bb7
SHA256f9ccb8e015a75ce4a537fb464878d55482ae6edc8c742f07f862128885f950a3
SHA51257755869731ccbe0c14f44cfd2f6ae8c1960bf8f20b4ca8f2ddd8f8e7f130f47d0a809ece17e5691d9958a79706b84ca8b1c8ebf740cf93ca3a81ad982585e8b
-
Filesize
6KB
MD56379a246172537e65c768dc2d2fc46fc
SHA19cf3d8f3ac99ddc9de0f7a85ef33aab75d94dc24
SHA25639c29d03db1101a1006b6535185ec602122158beb4943df8b7485f3b2f5760dd
SHA51284a30cc4ccff98e3ae121d61402e6005aa690d4cdb1db593f2502b06889236adf91b6d3112f23079b87e1b9df2e1d1da3734729226677896a12a9aebbcd1792f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58c97ddb3b8c42d58ee91124f8b6bd985
SHA138ac51d50331d3ba73e388c5f4dcc95400963a5f
SHA2563c5556a38f76801dd52232555c8486484b055dfa375e4ae28078b5ee46d74061
SHA512a6d0d3c29324bb5ac55d063a3e1a2ffbf3b12c4b2c54b98be9fde99a175eba722f7b4a15be1ac5821f80e612b30cead26408423b6bf56e6c08afa598e82a9b9b