Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 16:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://nuebn.com/pyt/dlbi8l/Y2hyaXN0b3BoZXIuam9uZXM0M0BhZG1pcmFsZ3JvdXAuY28udWs=3D
Resource
win10v2004-20240412-en
General
-
Target
https://nuebn.com/pyt/dlbi8l/Y2hyaXN0b3BoZXIuam9uZXM0M0BhZG1pcmFsZ3JvdXAuY28udWs=3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 4252 msedge.exe 4252 msedge.exe 2276 identity_helper.exe 2276 identity_helper.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 5104 4252 msedge.exe 87 PID 4252 wrote to memory of 5104 4252 msedge.exe 87 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 5052 4252 msedge.exe 88 PID 4252 wrote to memory of 1904 4252 msedge.exe 89 PID 4252 wrote to memory of 1904 4252 msedge.exe 89 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90 PID 4252 wrote to memory of 2492 4252 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://nuebn.com/pyt/dlbi8l/Y2hyaXN0b3BoZXIuam9uZXM0M0BhZG1pcmFsZ3JvdXAuY28udWs=3D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ff93e8946f8,0x7ff93e894708,0x7ff93e8947182⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,889780974009847171,9752182199960897220,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD552ecbd810e789a72c13ba8649bfd384b
SHA125914b045abb64e98754433be391d3a9cafa3522
SHA256cc232d496fb7617528537a7aab2121ae5c318ad328a95984d208ff1627e41d3a
SHA5123cb6f6b32f2490d84c45e91e3cfe403732d6f76859f816a325bfc0b21461b0222049ba9a05bc4467284910dd363e070232668e26052cd02f33a8782aaef0a79a
-
Filesize
610B
MD5e6b6c58851b13fe4a35c9f3edeb2299f
SHA179cdb3f9915cdf53613e48f7ef8e1dad86f9fc4c
SHA256b5adfa70e9a3ea75c79cd11374ec54fb08ed6a2fa6809f06fbd31fefc9acd5f6
SHA5122dc98e39d7eb213ca6b1dac68d9cb69b2317741aff29470cf24589ab4367af3e942133c989801567831db7af120eb705d36dada8a733d77469796f71707460c0
-
Filesize
5KB
MD565ff84dafbe5e0624a992cc6770c3dce
SHA1ccd719fe027783887f8d433091f2c8936ff48e84
SHA2560ec9aaf69c38f0151ae9a4f1dc1860f7b0f38efd37c39731b59064106722de3d
SHA512b2c6163bcb481fd84664476fe48cda0d5307d6aad4194c51f18af943924920f1cbc1b861099e96a338a00acb5890340de89373acc58f4e5a1bbeb7dce0675a74
-
Filesize
6KB
MD5754b2f41d312caeab3aefab71ec4824d
SHA1e27f55da896a90dce7f359238a4f336025c59d3f
SHA2565ace1a675b162239d8cb966f785b80e8febfb7e5f6e8b90536f54d806a701f64
SHA5124bbcda6aecdec68ab8043eb87c23b9e302abe265141929076681984386ff621e4136b6fb0cdaa0c09666540df166151f05cf39c078d87005db7bd28afaefce29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e8fb9d16e2b0f8d83be6cf22f077d997
SHA105aa9fffc1f7b57c8efc420696a0d98a8916eaa1
SHA256a3769ede94b18392b9d969622fa2cab82bc9346da33dcc167494dc83e1fb6033
SHA512d5dbda2477544a93b6b88a48881c8f32d81f8cb124328907be81267578621c6ff5ecca9a5ee28b24430493b464e13e7849e2d0f62bd478b8da1851721869e42a