Resubmissions
19/04/2024, 14:15
240419-rkh4lsfc7z 119/04/2024, 14:13
240419-rjkaaaed52 119/04/2024, 14:10
240419-rg5hfafc3w 119/04/2024, 14:08
240419-rf14mafb9w 1Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 14:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gate.sc/?url=https%3A%2F%2Fkrosnoth.online%2Fuser%2Franwakeawood1982&token=d824ef-1-1713535421999
Resource
win10v2004-20240412-en
General
-
Target
https://gate.sc/?url=https%3A%2F%2Fkrosnoth.online%2Fuser%2Franwakeawood1982&token=d824ef-1-1713535421999
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 3612 msedge.exe 3612 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 5048 3612 msedge.exe 87 PID 3612 wrote to memory of 5048 3612 msedge.exe 87 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1592 3612 msedge.exe 90 PID 3612 wrote to memory of 1860 3612 msedge.exe 91 PID 3612 wrote to memory of 1860 3612 msedge.exe 91 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92 PID 3612 wrote to memory of 4040 3612 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gate.sc/?url=https%3A%2F%2Fkrosnoth.online%2Fuser%2Franwakeawood1982&token=d824ef-1-17135354219991⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8522546f8,0x7ff852254708,0x7ff8522547182⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12387694073920089481,2654137579378727530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5b2c856604d319146f4b78bda46494527
SHA14f101b5acd53df2331963a51224fbfdd3df64a32
SHA256b7e0274765ad6ae2017139bb0a171eddf3e175700527766a0b96600981ef2add
SHA512f974c21f7cad0f0035633efa379bf05b0850033c3b7c9f0f68d63de24acd22df638f8d9e478b24812457f89c92384855bc470e88bf5a87f6b4d9617c9c42104d
-
Filesize
913B
MD538e09b838691dadbbfa55d7689a9600b
SHA17027a19d9e8e2b6b9b67b95b58b8268421e495cc
SHA25649b320ef9d191edafe3d5d3fe84ec1f2381d1efe2059a9d92910befc75047aa4
SHA512dab0471d8fd2f442737d4412fd38c033e82b27db980d22397b44f35b4bdf8e6c8b28f2a7e86a0c46ab79eff1b778f7aa52813f530dc2d1eb9b3ed513cbb34ff5
-
Filesize
6KB
MD5ed27622a6b845785739982e23f70996a
SHA1a8d67a827431175b0072273e28ae02a2f800e3c3
SHA2560866fa45ecdb39a16062c26360208682ab7b768fb968045867c43e6e836dd908
SHA512bd297b45c77a91c00743f35a4b1906c4a1bb4a68006831d56505419dcc389be427294eb3dd107d36b6594e0b8c112b16d981cb5ab6a08765d4e4c01cc5f82c91
-
Filesize
7KB
MD5b86e6c47e36c3a8717c35ea8a87db3f0
SHA1032854ac06b6c1fb3bfeaf8ded3d760fba6aa28e
SHA256041e0fa93bc658ae2a63fb59f93425433f769a9a4b6a3037430cbda802b8f3b9
SHA5121898cf4fd8110d41a43772a4332893e64eb6e85ee93ed61473bd1e2b56ea941fbc41c18fec02fa9c28a1b795515cb27af6ad4c4777e5786f1a915f38dd1665a2
-
Filesize
7KB
MD5fb03511949dfdef011bd718ffd5645ac
SHA144980072ec0fe7f232fdd09d6ec724a59f160f28
SHA2567aa8ae7573ced58bca8cc2c9e60ce1d55ef7f557afa0e6f6d28253e3bb42d4dd
SHA5122cec4b76fb1dde8d23ee2ed15450b107be320313715cf762a4d6f4b584943cc4b2c714acb6d75d9b0bf64f519544288185ac4676384b0b3c2f35dde493157106
-
Filesize
538B
MD566d99189fd3684d11d215361c59c484d
SHA1a2a2d3b9565efecd2d125afda79065935a8c8200
SHA2569d7f3c64c4696914c0bd57494f96d14b3fa28fb556c17d256787996d300dbc01
SHA512697f4ea897028fa31c2d3f21d11212479f268ce2c3cb379b69bd40e1896c9f8fe86fc42b3e9bb2859e3547e83ca2696bb9f3562fbb5c38a748ac6b62e5c8cf9e
-
Filesize
538B
MD51a3193c4dc84127a119a97c929858ea3
SHA16fec690a02e7017c6d7b72ebfc96434d115c3039
SHA256a1e2fe6aa956e41a6b8ecbfea4dab904682ed13d226b070ae1b39fde2751cca9
SHA512392e049ad76b2ea9ce4f19ec449301ae42b84d0e55ab773e223baae638b80354028d0dc4dddaecfd60e18b90f7bee21522484dc3d63f4828431fb66e3923234f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c2ca2a31c9d74e00c7461381d4ee7042
SHA113a989dfbd33fdb3f59d0bd63f1cc0042969ef37
SHA25645e4d66698d965f71a86f3887ee3e8c201e8a0447f0da7eaa3d3ce3213d3dd3b
SHA5125d403196377ab641dc481934fbadca2c372758c8cb90c67c3aeaa4285146719fa13ee7e12dfc17d6c7b3c43466e9455e6360555e7262f78c47d1f3ceed4eb3e7
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84