Analysis
-
max time kernel
269s -
max time network
272s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 17:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://fieryerythrina.skin
Resource
win10v2004-20240412-en
General
-
Target
http://fieryerythrina.skin
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1500 msedge.exe 1500 msedge.exe 2116 msedge.exe 2116 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 5308 msedge.exe 5308 msedge.exe 5308 msedge.exe 5308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2664 2116 msedge.exe 85 PID 2116 wrote to memory of 2664 2116 msedge.exe 85 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 2900 2116 msedge.exe 86 PID 2116 wrote to memory of 1500 2116 msedge.exe 87 PID 2116 wrote to memory of 1500 2116 msedge.exe 87 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88 PID 2116 wrote to memory of 368 2116 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fieryerythrina.skin1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7410453514144912162,14314530970503559482,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5efbaed85204ed2d853d80c98b0993553
SHA12abfcdcc0efee9e63d53edbaea75c7ea68682410
SHA2569aab674707318e50ef810bdee56e9575533c45610b1322267ca13b51cfe40c56
SHA512bf777e0c3ded0b3f96ced0c049d6db09531d9be69379df989e86ebad8750b9b8963c285082087eb79c1aedcef6fdd3aa94da09344904839481e5bfd9970c773a
-
Filesize
1KB
MD56dbf0b8e0061afcdee7da2e4c85dc108
SHA18b075d2c7014edf649713e1a11755a3b9c734c64
SHA256668cc4202b1bea0122bc86d0cff44629809674586bbeb3f881fa13706a5f7f87
SHA512489fc660c9bb82c0171ad470bd0b14f4ac320f78a309264a5f79a3c4eec7a32e15d0ab5b6e5e692e763f465e3b6c0e4d848ead7cf66cefa76076ae449420a9e1
-
Filesize
6KB
MD5aad4981a0ca07628a14eb12871987b7f
SHA1db74829445724f42fc280385dfaace086fb40f16
SHA25697de7a346262b559fad50e1ea3388e361e0d02320ccca20e6dffddb6b155eda0
SHA5127a6bf463536f059bac9972b260d2143d0ce1c8083e7f1aee1546d8cbed8cdc6123ea34b8227cf70a6b16d9dde288d84fb290065cce1dba5d0773cbcbf653b553
-
Filesize
7KB
MD5ec4219fc0a00cde09d3e6014cf845b2f
SHA1ff0c459e1ca05dea19c0231901c43fb4e587111d
SHA25653b2ecd1daab784ae621382fccc75da5b706f36109b4ed4c7bc85d0ecf1d8946
SHA512dace70fbc8deb46f3064cdc46732d8840f7215ace1290c8e2f2fcc9271e7b53fbce4bfaf172548ea4083a787c21461bfada416cad11cad145c43e609a6dcc719
-
Filesize
6KB
MD5e81753ba4850de329d186dae7e88bd50
SHA1068609213846f883bbb63a7f757a8b08c4e477d6
SHA25649b8c21bcdba6b9abcd08b6b80760373a4ac86b69a0984c11bfb4ab40b34bd21
SHA512691164f366900ceb8909f820901589fc2d4a44266ea6b41314c59cb40d73438e86b2a6b8799928295be7372294d22fbf5c97c51615608f34f775e1cf2ab2233c
-
Filesize
6KB
MD534fab2de0377e6f451c3915dae011846
SHA1b356e69bf2dc64940489227ab9c1a0bf92ecf092
SHA2563a7d289e454bf2e05f39ec3a1273e31f44d733d34ea04fbf24bed4230a5de0db
SHA512f93434f09dfdda7b1b0396cc93d7499a422287c8b233b0f6a162dd00d7ae172ef0204a6a79e0a2b5fe5f57abf5c33542e3016aad9a339d657f1465a0664c2aca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cff5587e6109f501f1b0991bdbfd7399
SHA1c17e2d825c9b56455c374c6c8ab074344d1e1547
SHA256ee3387a8899328f3955f717248d0f99787e0c1100ae49b868721c57669ca456a
SHA5127d7e3b4729933a6dadcfcf761802849afe0ac5b80f46afcdc784f63ae89c001a2dbf00c534d941ddc78aaa6c87928dd4520b90ffb0abcf0560a5cbb99344744e