Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 01:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://grouped-euphorbia-9040ad6256fd.herokuapp.com/+?y=49ii4eh26or30p346thm4eb4ccs3iphg60o3ep1hc4ojadh2
Resource
win10v2004-20240226-en
General
-
Target
https://grouped-euphorbia-9040ad6256fd.herokuapp.com/+?y=49ii4eh26or30p346thm4eb4ccs3iphg60o3ep1hc4ojadh2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 1436 msedge.exe 1436 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2256 1436 msedge.exe 85 PID 1436 wrote to memory of 2256 1436 msedge.exe 85 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 2844 1436 msedge.exe 86 PID 1436 wrote to memory of 4168 1436 msedge.exe 87 PID 1436 wrote to memory of 4168 1436 msedge.exe 87 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88 PID 1436 wrote to memory of 1812 1436 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://grouped-euphorbia-9040ad6256fd.herokuapp.com/+?y=49ii4eh26or30p346thm4eb4ccs3iphg60o3ep1hc4ojadh21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c99e46f8,0x7ff9c99e4708,0x7ff9c99e47182⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2890763950259842953,17139736945857391032,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
308B
MD57bcc155113b8b1205fadaef5547f65bc
SHA1de5de4d70c0ed48e39e45c2c50b86093b304d35b
SHA2569b942c57c798da1294e98f3a069027179867631727accddab73c5d6eb80d015a
SHA512322fab06db00d55fc3552464b7b3464c9ca085b2b0f89960cc395f71d2f73bc56cf05fe9ddc0d47cf06b04d80694c77dfca5b09a45d7633f671b0bd6add5c383
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD51ce96d4f11c13979ee75c62e3c488fe1
SHA1419beaf9058a0bb443dae4afc91180d5dca58311
SHA2566f177128d132d54e145772bb7ad4b3eb012f77093783d23b72033f35480e8257
SHA5120e01f2f6afc533044109699b113799383f0aa23a9722e5ffefb9279b426313598b2ef23fa05af4a7dcf87aabf0123c7ccf4d4ab727bb4b277e3f1496be7c8380
-
Filesize
6KB
MD58e253b00869400321cc70afbe6e66eb2
SHA165b06dd435712a2d49381ba3dce81d8d264e835f
SHA256be4222d614a6db69a957b47865dcc84a455fb5bff67cbdb8c9114431624bdee6
SHA512e63e84fb73fa156965bcbfc980cab5833adfc6bea0eb8d0aa7cbb18426d0ddd4b6f6894ca0c834e119024cb74e96b3bc465b09102bb003f03c91c490996c97a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54fbde685d7270daec08ce38a9c8a3532
SHA1e63fd041a946ab0971f1dbf9fc471af4273a0e76
SHA2563a8c865875fce3d996ed96ea75449797d41668a2d4bb637529fae317b8a9d99c
SHA5126279a098772e60f3fd754f96ab5d6985fe4729d6ae467add8d1a35c1d2b9053fd6c713a129beba46a8732197ddf2d3d12cbf296fd6ace4cccfd26c6221590885