Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 15:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://carrentalcrew.com
Resource
win10v2004-20240419-en
General
-
Target
http://carrentalcrew.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 320 msedge.exe 320 msedge.exe 3316 msedge.exe 3316 msedge.exe 3812 identity_helper.exe 3812 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 2000 320 msedge.exe 86 PID 320 wrote to memory of 2000 320 msedge.exe 86 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 2480 320 msedge.exe 87 PID 320 wrote to memory of 3316 320 msedge.exe 88 PID 320 wrote to memory of 3316 320 msedge.exe 88 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89 PID 320 wrote to memory of 3532 320 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://carrentalcrew.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3a8246f8,0x7ffa3a824708,0x7ffa3a8247182⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,3064425165458662587,8156305890014145538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5fd0c98eb825365e4d3b5eecfa81d54f6
SHA171b48595243eafbce4ca7d0af6c9e0c656c7ed67
SHA25600087d13d3a3ffda5cc3842c153922861cfe99d876aaa3f822e73ecf518679da
SHA5128c9e544b09dc4edd93a79d5559550f08324c06ca21796c7fb8a8765958e334edebfe65830897ab396c957b6cd17a0cf1d5c810134065095e57ccc5eb6c091042
-
Filesize
1014B
MD5e2cc189f9e069dfec610920fd65715fc
SHA1bb65314731d8e668e590368a484c130221139e7a
SHA256a070064b21daff5c872f3f40bb789ae8321d5d44f4a36589953c547fba25373e
SHA5124258a1f958a1701fbf8a47e09e5f96de884903fe532a6d34ecab130f5b35df87e4b67a3a7098e87d5524558d5ba74ffa8890dfed506b8cd516bbd7679b7987c9
-
Filesize
5KB
MD5cd8e24e179c0613e962c8d6fee9a9486
SHA1c1b8f07eaf94b9d35d6b42c6956fcbff521f6135
SHA256ceebbfa664feac382881a494bdb02a6f7521304c73eb6767a67f0b3521218ae2
SHA51269daee174e74d52d5f44b9f6f5b152a11b5ac3463fae964b1e012958c89ed0b75db73dbcebce55ac78f1b999f24d7a05a4964fda49e9006dbb3aeb2e7338b51e
-
Filesize
6KB
MD50569662128471f207f01518529990941
SHA1149953fd82dd8df57ae201678ca941a16cd66c96
SHA256b45ce1f9afa884123c39da5090c695e4dd9c11c4ec4546047f5e9732b7992460
SHA512be94e26cd3736d1216e54fbc976e96421b70a1f430324a8435cf4ab9ad65ddf8740f86ffe9385b4042ab8928fcad8fe788ce41be07d7a3c59044f8a40ed05ac5
-
Filesize
6KB
MD5fefd24a375cf6b0f624a1bda8f9dd7e7
SHA191b8f2e0673d62a3b351d35442198412ebe6d410
SHA25651939a1dc05369d0f0ad876fdbac53261c4aa1a6fd9e772760b7a40b24b427bb
SHA512241465d1490eeda3bca6bb1757a659f57f064c12c6198cb8b75c6c61c5f738cd6acd8869e4e530d6c43101f0f5585e890489a26533596e4d1c52fed3b6f165fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50347afda2a5862f481074724dcaa8d26
SHA17d1a5045784930ced7fc861f26a2a6eb9114c9ef
SHA2563405f2f8b8a90025d51050f9462b37fd0d1bed5a17342dd48880c88babeecf2d
SHA5122e1826853f8fca61665f88cb8663918c3a71efa6333d2af37efa7952e4a05751ac1645e572d2b8e33966a4cf6fd77a1edd55561cbc9cb73b78171b2e6d95a9be