Analysis
-
max time kernel
55s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 20:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://voti.me/
Resource
win10v2004-20240226-en
General
-
Target
https://voti.me/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 464 msedge.exe 464 msedge.exe 1940 msedge.exe 1940 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4804 1940 msedge.exe 89 PID 1940 wrote to memory of 4804 1940 msedge.exe 89 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 636 1940 msedge.exe 90 PID 1940 wrote to memory of 464 1940 msedge.exe 91 PID 1940 wrote to memory of 464 1940 msedge.exe 91 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92 PID 1940 wrote to memory of 456 1940 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://voti.me/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5404299015332056740,3546871291824632488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD5c32ef9d5198492b6d0d1265678f22e5c
SHA163e3878280e5c6c7f7ef8986c0ad654d006c39f9
SHA256a6983198b25357288ec3a5f7547502fa13bdd5b8f16a05942c048a147dad04d5
SHA5124aa655bd3a94664e94c077ab8ba0d8d89671758ef283453c373dde213d7f361afced06817c3a8e982d1f56341cb0e6ffa05287a00268bde1f53d6d7879034a26
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD55993d12680a873b9e66bb4a977f0645b
SHA14358076c856de46cbe38effb52b1e1d10df443b1
SHA256cd92eb883cf1df07f34ea7d48e3d20245d8933a6dcef50ba96a9d33ab5129281
SHA512438c7a0bd666057c7a310e9806656f59de8ea561dcd0378886f7b3500b1665dc8f579ee1b0544088bb6c1b7be3c9bc127008306bdff3e4ca7241de88a8537524
-
Filesize
6KB
MD51e841fa994d5571fa57aba870b94557d
SHA1aa484f8e50b90fc943050695d52560953772c8f9
SHA256f62dd1adeda0a4d919fc64418755aef34fb2ddb783f4d2eee444763599bc41db
SHA512b2aa362e4e7cbf271e89f4e05fd337957efac6dbfc0792cc4d0e43ea5bf85239b42e6a355194bef12d485e011607a9d4a55e98651f71b18a1a0c65a5f52dc409
-
Filesize
6KB
MD5c5d7d4bc5039c84ed9ba413f109c4a96
SHA1dd212e6cc737073e4d737fbf762993b80e188653
SHA25664e27a9a46d146ceb8716685044e85ce7ae995cfdfd87e7a44e92f3de48fd8b8
SHA5123a55cbd1a2dd09c5551184e8da799ad92307075e44b35ef5218b70bf1ab79e34dbadaa350ae20743716b5446281f9ada29a2cbea4548dace890490c99bd4f09c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ff47823bc679cd9b59eb50951187c30
SHA1f475777e244f1e30497671ddc017621099433ec2
SHA2566678385f96f01288750a9cff963fc3150dfd55defe46e5a4b105cae07437ccb1
SHA51243158c2c81969d3006adb1f55d21e498b8ecfb42e987c3cf29049765d5d6686e5a8970146eeb134248261ba156cb8d1bfd1c616dc330bf085f2c6a70aafa702e