Analysis
-
max time kernel
19s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 22:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://guns.lol
Resource
win10v2004-20240412-en
General
-
Target
http://guns.lol
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 4292 msedge.exe 4292 msedge.exe 452 identity_helper.exe 452 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3196 4292 msedge.exe 87 PID 4292 wrote to memory of 3196 4292 msedge.exe 87 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 1412 4292 msedge.exe 88 PID 4292 wrote to memory of 3052 4292 msedge.exe 89 PID 4292 wrote to memory of 3052 4292 msedge.exe 89 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90 PID 4292 wrote to memory of 3756 4292 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://guns.lol1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc04346f8,0x7fffc0434708,0x7fffc04347182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,703694409220247985,14251783590930956839,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD56746315c202c8d5d5e70cc5fdda5d9a6
SHA19f46213eebe1a43fdd9df1812ab767e6588f51a5
SHA2565aaae746e850425726b8710a9d5389c78cb590c3032c12195e8938519e8dce4e
SHA51233d9f717f2ffb36da6a4dcb40054c4428007ef84053ebf14ece13404700d7a0c85d92ccc88922a420db35a043fdb2b10e294e8481ad2cb3b81bf2136bcf55ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5df508146e0068550b2f97aa7c3353c2a
SHA1d3756ed9bead7718410cfd151125fb636889e2da
SHA25639e183f5b2928cce44ca1b1eab70e80018f8193500a207a94761bb732e310a14
SHA512eef42bf2d50d6482c83f15499035be61d2cc9172aac4925dfa4caaf80bac90f1dac006aeeb17b017725471fd30697178bf30c052e9b16e128065cab8d56b5307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5d93ef78000319750a349879bd31bf3ba
SHA112d71d4c1ef02c7019ce54292f95b6269748a57c
SHA256d2b4fe825fde4f301833ac9aa85f2f674dc37778b4df1412167207585ebf42b4
SHA512289681722efc79745a15f4c8be5562617a84c33a8f9a780f801b4450988409c029c77ce86c14238348b1f96e91e7ec8ce08ff62bd1f984e3945fe93d828cabb1
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5e12443f2bdf70e192be3338fc2f7c859
SHA1fa647bbdfcf1c830a4755d451b4e21e1c6986c41
SHA256d42d2258eca67b0d1e96df5c4f525923a4a4a1e3c85ac5f08f18e132bda17c69
SHA512e1d70c53bcaf134bb51910212c79a3a8ba2b3e9923f03ec3a6d58af4d61cd9f407763383222149b8c1cb64c29dd38d73d3408ec2e05f5f6dcb199d9578a99c18
-
Filesize
1KB
MD5b5ee7f325d4126bf03c38cba03265932
SHA10e214ae2d069b376dc165b84dc65b3442554d860
SHA25653013e12e8a2fd972c709dfe4b448680df202ada9eca5b9f4a1c8c5fa694290f
SHA51231a40cd122f2ab6191a638cd1a2a1ce5e1ed919a7df113e8394c4595f7f0be3578e0ae8ce16b94b1077ed04abcd0d25bf46f6bac0f2a2330c9976dc5dab8c466
-
Filesize
6KB
MD5fd432132b2914a9d3b2eb515b636edef
SHA11542f515c8353646a84001476ca973521ba22074
SHA25674a4ecae4c996f9b7e6a8a9c0d238841136241df483be700c014924e90f6f884
SHA5129782dea4b72528564848294ff9bc01a3e5eaf4ef82296d30bb27dfe3a46efe4030ac017969a694f400bc7c112d081b59853ffe3fe4643b669eb79f19ba3b5aa1
-
Filesize
6KB
MD58123b2b26a1e0d580f08fc0e3681ad1b
SHA11e4ae5efd14028dbf98b64e5623b0dd0639ed9f4
SHA256642542c389bdd1ac4a5576a128559d8b15ad01d618cf01612da6b25377c77c29
SHA512cc5b234fffa1d7ff6f0d45894807695e2060ebc2539997decd4ff2b7de8c322001283acf81e3404a28a19c1b7a5030f2276b19c7d385ea779ab417ed8434e6c0
-
Filesize
7KB
MD5848b5c03b061a319daadfda04b208860
SHA1a5783c96c91f84f7ea4f846bcb0a1a439f804675
SHA2568f123f5df3f64f762c38233396f7ece362ee1f0779cde4fd0c410eeab863d4ce
SHA512b410744abcf7eb0b1cde13655d0e80675c3dc67405bc183c9af53fbcbc80fbd44b3e0f7299250c0fe6ef134f6c452db9688b0b1e4868a626d02102dfdc87aeec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2438350-8874-4a0a-bda4-64a1fd4db79c.tmp
Filesize371B
MD50233358ae5d1096b4ea5f51a8a4fa408
SHA1e6022929fd78a11e5f14bd28b8937d6b2144e66b
SHA256104808644715b11c206828ec0458725e1c8a15fcebd01cb4382c050a8d693078
SHA512e82a3698f695b6ff285c0ab14935df1299562bf6d4034c6aa4aad93a7949ec68c81eda74afadbd2f41a113d61bacbf0fa2b6273f391415808d6dbca7f5729f5f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f6769416e504d78d5ef7b40dff6a3da
SHA190c5a38b9d4119e7a98b34264ad03512a692975e
SHA25618773f450ef1b4ba0dd9d49ac5591e3066a2f4a780f6831576f86ca47033f86d
SHA512c2af2c13b8ff451f1fd05c3a0d419a56d72b81ee902e2ce364df5cf7b9c2f6f75d5d39d617af4f04a282b4339355febb666ccbab96f6e1b432e24e10cb734900
-
Filesize
11KB
MD5727c9fb881aaa72642259582717bdbd8
SHA10e5f2597c90b19d5d364e1e50ea2e41f25a31499
SHA25666345b118bcf529fa02992f69561fbc492f0fa31840dc94fb653367494f56b60
SHA5120eb929c69a44120c6effb033bdc288f7959b5ec16f39957be7e46ab4a6b52a321574d4cfb7ff25c10eb274de90295f41c84184180065ae18b8a957aaef4255e8