Resubmissions
31-05-2024 02:35
240531-c2575sdc55 1028-04-2024 02:14
240428-cn9neaed3x 1028-04-2024 02:13
240428-cnrslaed2t 128-04-2024 02:12
240428-cnbrdaea24 126-04-2024 00:04
240426-acp4hsgd2y 826-04-2024 00:01
240426-aavk8agd44 825-04-2024 23:58
240425-3z845agc9v 1025-04-2024 23:54
240425-3x5zpagc8x 10Analysis
-
max time kernel
480s -
max time network
484s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-04-2024 00:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://185.215.113.66/npp.exe
Resource
win11-20240412-en
General
-
Target
http://185.215.113.66/npp.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 700338.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 3444 msedge.exe 3444 msedge.exe 4888 msedge.exe 4888 msedge.exe 4688 identity_helper.exe 4688 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
Processes:
msedge.exepid process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4888 wrote to memory of 904 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 904 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2156 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 3444 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 3444 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe PID 4888 wrote to memory of 2184 4888 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://185.215.113.66/npp.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc0b4b3cb8,0x7ffc0b4b3cc8,0x7ffc0b4b3cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5780 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,5591158277593167857,11372527355409712552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD557e5c5a9236321d336e2c8ce1eeff844
SHA18fd4288af72ba3f7a0ecc5583a9265723fefc096
SHA256ae6496cf397848bf3139858deaf567e3df991bab5a7704a0fa7aae95474872d7
SHA512bc3f24afe6ce0494022d8201a01a60239ac5cfee54e0650a337036817056424b418cb636d58d07e5034dffe2226906202b56509e4cc07562c0b60f618c420080
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5493e7e14aceba0ff1c0720920cccc4a2
SHA1468f39cefbcf14a04388b72d4f02552649bf3101
SHA256a0dd32ed60115f661a4ca537472e0d4e230ff844d56a3db766299cf4cd817842
SHA512e16c748e4513ea10bf7124cef7b50dc5f3a1802205af9228e0c33fdbf3c24286739db08db4b813079ed7cc36be43d7457f4c26f00ae3126a2fafd77d2696107a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5f8ee10a89e736206a14adb52d57ad9ca
SHA16b090bcf3b22b6b920916f828f59c9c77073f9a4
SHA256aea65412799b0ee8e6ab3451d2eecbe3e07e710580f08e9dd1c4c48f6763069e
SHA512faacfe681493412475b0dd94cb0700bd7b98c54e1deaead5c5c24f9623a1cf0a971dd143339b5785c2cbfdf8e6fd54033e1be304f5154e263ceffae3decc0c1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD50d02cf084af793bdbb180b2c6d5ff0e8
SHA121ad07734ae7ef5aa01d2c302bc6283a783cf982
SHA256ca1229598a2829dd704a4e0517395a21a10a9ccbd6044c51ed2d6d1a242d9050
SHA5127b65f1c4c8e561b3183acf3d500dfb9cafe2ef0c2ab86f80adbc3b7de9d1887fde1af0ce92ecd2d41887ffa49ec0726367d5d02e994bce92a93553f04eba41a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD52b42c6537ae467c7025cc9fb61775e61
SHA183c369fbe1a55f011af2204d5a2f4a45f6b0ac6c
SHA256e06c09e4a12a765211767a3376289435e00d417a9d7ce38228d1dedf3f5635aa
SHA51210bb8157eb203dfe7027c5c238a4393e277fa0bf5fee86a65cd4881c7ed0418f1abc5495f8e16452a48dd0ade555e211aabb8cdcb0778c7e2cf6fe122f0bfcff
-
\??\pipe\LOCAL\crashpad_4888_ZSXDHILPZGLSFFZOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e