Resubmissions
05/05/2024, 13:08
240505-qdam8aea82 605/05/2024, 13:07
240505-qcmw6aag71 405/05/2024, 13:05
240505-qbkqeaag5w 405/05/2024, 13:01
240505-p9hg9saf7y 105/05/2024, 12:57
240505-p6z8xaae9t 6Analysis
-
max time kernel
1783s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kinitopet.com
Resource
win10v2004-20240419-en
General
-
Target
http://kinitopet.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 61 drive.google.com 62 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3940 msedge.exe 3940 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3808 3940 msedge.exe 84 PID 3940 wrote to memory of 3808 3940 msedge.exe 84 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 4248 3940 msedge.exe 85 PID 3940 wrote to memory of 3664 3940 msedge.exe 86 PID 3940 wrote to memory of 3664 3940 msedge.exe 86 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87 PID 3940 wrote to memory of 4388 3940 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kinitopet.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8299e46f8,0x7ff8299e4708,0x7ff8299e47182⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,18110629042085214154,12468695709977018539,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
20KB
MD5a5459ae0a430f8f3e23d13f7338a9e7a
SHA1392f71ef296aafaadf2c506936a9ca7b96bf5485
SHA2562b001664d567f7c9b53c07ba4e05b6060761d53d1ea8801d541065fa66427bcc
SHA512c4d414106e2fb064ea50b2ea11d01f3d35b7c6bff91b42c40c56137ce0b1a92840b32bab2fd892c4d14ffe5643ef5938cad6b6db029857935a820653dfa9f1d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD56754cb2151b0617ed24a06962c6f334b
SHA1a7cffca954e653b6e999ec3030eed872456ab72d
SHA256839239b733f5c4f8c36c2598e660cfeb8e2965353afb4d963d1708c5f60fe913
SHA512829ec11bef08f524d11737e8cc9d0035bd3f6fa7a3cab3504d663dee841756f7b83e882f4d4d05835814620cf516724e09cb58823f5405da1b8519768abf0023
-
Filesize
2KB
MD52ef8b509b0dd15a4ec0534c2bfbd3f8a
SHA12a68c51f4518a888c270c7111bc24cb7af8328ef
SHA2563e941ed4e47c4f33b99a9617dc2d235ebdc22a8bee0404001e0b1e52f73f843e
SHA5128bd524e61ffb8490711e5e0b9e98757850a0a6dbfd449583e787a6fb85babbd412d56416d525739dff78d9802c86645261e84c2e2b244b078a5e6a4cdf27a0b9
-
Filesize
7KB
MD52d272b61fd13180c9c93359c912cee3e
SHA1ac16e8a8f34bc5a07f6ed8189d3efc7027a7cf5f
SHA2562da8a872b2258d39943f17ae84de2389d354bb7766d61eacee730b711b7e2908
SHA5126756d30a7b14f66d890a00e50d9c33b5b3ff6e7c38644505845fca14cbf9f0af0447455bdcff857337f8acbdada5e3dbac353ad3dbc40ddceda3d2a0ca7e2a59
-
Filesize
5KB
MD56e8ab4e8ab715234ac1fe97859b9f8e4
SHA14565276c0e99181e3bd52eedb795de47716b185c
SHA256a7f4bcb7f14de7cb8219bcf25322dd7c104b066dc284719a3c9c7a08787f4874
SHA5128c7e2de041594e1dae22d9c8a8c6454327a5662a4b524d5fda08353d3500fbe22f507201e6c799819dfa3caddc3c9ac79019a9bd5a5470d30a157dcdb4538179
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57206ffd11bf1acd29b3ba6c89e806815
SHA1b8c82ba1a5bd8a8be1ead0d488e23eb94adb3988
SHA2563121c5d80082838732b227c1ebd159543d696da4c59c8e56c5708a2121cc0292
SHA5122fdeead0d6dca73677fcd1f849f66412e8c36050d6e568ebb42ac1fd9acaaadc85cb9ee2d7be04307cb1a9cc5a877ab8a5ee66b3cb34988d4327ccf8f777b004