Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 14:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://brbbr.com/Z5t0NL
Resource
win10v2004-20240226-en
General
-
Target
http://brbbr.com/Z5t0NL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 2948 msedge.exe 2948 msedge.exe 1968 identity_helper.exe 1968 identity_helper.exe 5944 msedge.exe 5944 msedge.exe 5944 msedge.exe 5944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1512 2948 msedge.exe 88 PID 2948 wrote to memory of 1512 2948 msedge.exe 88 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 464 2948 msedge.exe 90 PID 2948 wrote to memory of 3580 2948 msedge.exe 91 PID 2948 wrote to memory of 3580 2948 msedge.exe 91 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92 PID 2948 wrote to memory of 368 2948 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://brbbr.com/Z5t0NL1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c8fb46f8,0x7ff8c8fb4708,0x7ff8c8fb47182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,1670528857256991194,15385619202125858773,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5a839ef1fb52c7a017a522854cb78502d
SHA1fe2e419db3d75a5e408f6736eadbde822715d3b0
SHA25677fa78016ef14c92ec311b5f32a71a78860770fe77ee10652a02fce7572e5bcb
SHA512d26c2efdd4da73c683b2ac63e20e0ea086d8cafc92fae4c3f799b2d0eaf0cfee4608c1da515e30cf119292bcf1d8a2fde1866407fc350831edee954c060dcba0
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD53b6d25f716a328193719592ae1602f0f
SHA1683994158c21a182cb66dae5700ceefa3a91e236
SHA256610ec57849e09f6ad08e183c29394e87f683a71c1610825a5c4236bb06445779
SHA5129237606c140ae7e61459857f0ba60b60fe01d8c9de8b2bd3426cb051b102efa6104b0a5eaa4795187722cbdbb397a5429b3826450b6664361a0cdebb338e7544
-
Filesize
6KB
MD563fb225e64cc08d1aca13e509b637c84
SHA1c771f2d253714cad86cfa519013b33a5e9825b50
SHA25657e858f89801a6a4f19a71a347f1f7831f28f3dd844b0d0913f47dcb5a170be4
SHA51203e69f8527f88e25d5564caf7a0b64eec8a49f906418fce1834d402ea74335a730bc186e6ff43e70b42574129c45cf5bf7a1e01426e40202462373cf5842012a
-
Filesize
6KB
MD5c3b092a581a2c9a48b42917f3749d0a4
SHA1690f6f28aada89404596e7da29bec9fe9c1e19c0
SHA2564a92cf694e655783988bd855bbfc807227b3ce93740405148ac5ac86e9b1f227
SHA51241ef562ab115838d3deb0179354c99e3d57541f5140d4fa6d1b1648704ce77ed914061b8d8829ace9811ce0071caf14c3dc7cfe27467f5dfcfed225f283a8b5a
-
Filesize
6KB
MD5113e59755330d985ae3864cae5ea3812
SHA104e43ed47b86b4afcf502295fdaa78ff6dcb8a0d
SHA256e9467ad5093ba69a0a4a912b1f017b66e3e38d33b9a1293a2cab92aaf0932040
SHA5120b42e08e848259f7d958d37b7f2d53d24fcfdb3323b50242dfad2a5c0975a7013d99e89fc72233f2fbc3f3907d129a470065975f3f511c41ededb7dd8d49ea19
-
Filesize
371B
MD598f449e0dc611f548767d0cbf8ed59d2
SHA162ba8de332db26bf8d0a26fe893aa1ad88ca5a4a
SHA256ec919b587165323438d65ac5b808b7f5873e637a04f80a72dfe67add85298d0c
SHA512dfa6eb6ef4a6e1fe5db29f352e077cef08e0b2e668e5f82d4d7862207128c44109501f3b1cc753522f5b473f84115161493ed9bcd209fb02ba4c813896015795
-
Filesize
204B
MD55525b852a0688719914a7edf9bab78fa
SHA11c6e4c6fcd43fcd7ec9c5f245b75d37533499757
SHA256d605bb1696c1548b7206d6f5a798963f68b31d846c8ccbf48d1e386da788540e
SHA512a19aa1b70142ec579156d18f1d24e75c15909fef92d128b65b8b575c2e8fe72511f5dce4d4fe0176b2c4189a1d8f967ab82a4393dc3c56a9f66299563b32e99f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5131cd4218958f587c69c310a9494fcae
SHA15381607ace717c79f7f479e9812c7121b837fb2b
SHA2560f6a522ba79413409a83a0533e5656e25f6fa54f7b129be3ef5a7239e851970d
SHA5128ac8716f073463e916c2732f33e85e92fcf203cb0b0df6934a7249fc33f59bfbc33d24c589f58fd6b29c089a649d8115bc345c3c1c37197f8a572da33c327b96