Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 03:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://srvassist-ckh.dynv6.net/ds
Resource
win10v2004-20240412-en
General
-
Target
https://srvassist-ckh.dynv6.net/ds
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 1936 msedge.exe 1936 msedge.exe 4736 identity_helper.exe 4736 identity_helper.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2288 1936 msedge.exe 84 PID 1936 wrote to memory of 2288 1936 msedge.exe 84 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 3652 1936 msedge.exe 85 PID 1936 wrote to memory of 4336 1936 msedge.exe 86 PID 1936 wrote to memory of 4336 1936 msedge.exe 86 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87 PID 1936 wrote to memory of 1392 1936 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://srvassist-ckh.dynv6.net/ds1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc147b46f8,0x7ffc147b4708,0x7ffc147b47182⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1667610443921310323,13244126700497717761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e6d01b315db371171c6c14f2585edab7
SHA19f230c2a96f30b736026d21ddfb4b0d14676215c
SHA2564f320fe9142944e2e3366f916cf16558447beff9272dc1256e63ca4b9505fca1
SHA512f072a7a4eca35ff449987fce5306220fc01af19c4b437e104f70838dc33d4fd80d70660f9942ab7adccb43e37be7ac84515ea307f8947eb9f3262364c1acbc1a
-
Filesize
698B
MD5b98e8bcb2055433cfffe4ca52839f580
SHA16f3531a9b35d941919230b1981407ab93c7a987b
SHA256ec48710404a2efc608b2d98d665e8dce8c5f1161937ecf27b3d31465b9a19caa
SHA51236715b983afe66642bdca0394f0fce6659746ba9289287a374d64c9a7a2d6515d1e9eb5afe9b57bd5173ed8ed9365e8051a889c3b3a5c3306dd67e667447db0e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
666B
MD51c0459abfb1c0d47a1afd2955f2409fb
SHA1d6f53ddb3db3bac2672785b07a5b7df3f0136ae9
SHA256b0375987effe87cae17c71854f170a226a22d6e5f282b3bec3ae52bd863d6d04
SHA512b6e5bf15a37b5b3c840237eb37be8eaaa4b1e41b74bd628e263adca1f3e79fb6fc186edd29b3f5eba9bc0328772d6ec3827bc2229101a78f9a7c1ef36cb728b8
-
Filesize
6KB
MD55d4b945c1784f0d6ca522a4c96997d01
SHA1669a10479eddc5b40a5617cacac1ea6cc71d573a
SHA2569e0d154ead2537af241b6ac14822c481b0fab304889c00c233f182dd7fbe0f85
SHA5128a8ce7217770f8c19ed076d718d7ab9abed0983e921bb82949cb344c0d8b9bf2e45615b1d78bd7416e3df59f65bff9edc99ebd68d918f891d1f77b84685630ce
-
Filesize
6KB
MD54d27766b3bef30e0b2b3dd05d0c5b608
SHA10eae104ee4325140d725ae5923af2d6c5204758d
SHA25670eb9cf7f7fd48969d2c3ac8818b183ea1f3318f6a9e3382ae1f386978ba71d0
SHA51240bb4e004b57a52dfdbc275331468be89c8d768ef46173998bf710a41c0d3337a03699fe41bd65745e6eb900f39e5d3ac348f3ef4f657b109243d36077056e46
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d811be87d0f1e82b09c2c1e603f0791a
SHA1e94576f926339959ea877a8413bd03556d16f96a
SHA256b46d59975936b91d533e53c5d7d6b42f13d5f491cd637b94786d959b5cc51294
SHA512ea70fb0356d5583833796df8e1215791605ab9b59dc6bc03ef1cb2720cd8894b4592385dbdf869a646be28d2e26cba5d6c373df118980d92b301dc4f5a1e0e2d