Analysis
-
max time kernel
61s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-05-2024 22:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Youareanidiot.cc
Resource
win11-20240426-en
General
-
Target
http://Youareanidiot.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 4564 msedge.exe 4564 msedge.exe 3584 msedge.exe 3584 msedge.exe 1596 identity_helper.exe 1596 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 860 4564 msedge.exe 78 PID 4564 wrote to memory of 860 4564 msedge.exe 78 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 4652 4564 msedge.exe 79 PID 4564 wrote to memory of 3916 4564 msedge.exe 80 PID 4564 wrote to memory of 3916 4564 msedge.exe 80 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81 PID 4564 wrote to memory of 4720 4564 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://Youareanidiot.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc0b5d3cb8,0x7ffc0b5d3cc8,0x7ffc0b5d3cd82⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,9736589675714468331,11885373201096530128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
Filesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD558a390979f9b13c131f1b0c49f57eded
SHA1f312325c79cf0f61ed0184e7e9e5389898bb3920
SHA256e98fcc556060fb6ed1da31ae6cce15075810ae71a260801559edc0a70da6bfa2
SHA512dc65418fe574d06ffcdc4d0915216a17f155ad95ac14e4aadd2947aff9a294674a8bbd140faac75c1ca021f9066570f1032a73b64ffd0ccae3ecf9faefd0b565
-
Filesize
5KB
MD51632fb5d72a6297c335a7063e18cf13d
SHA1be89227347cdf66dcb71d23c4fc6ebc52e8f9092
SHA256e721d66ba116ce89b713edc641e021310b02ca5f7de64a7d0baff632b64e33e7
SHA5123dcccae2c7b9d49b1411ca52d08231779079bb783e890bca1ac6aa72961e148c2bb45864e4d057584f92d0ecc98ccae630b70d7301ee0abecc9fe49221ce9de2
-
Filesize
6KB
MD5f7115c8f1f9a33075881807f8567c292
SHA1346abc3badd6324161d8f8c405ef849ed2a878ef
SHA256467d9bb7f6613e081b7bd1f2530b764ac5b7f0b00305a698ea8dde7e46089ceb
SHA5123e17da3a261be7f8e6eab3bf8229b25187f933fbb0a35d7e5f41f13c89d2184c7c9c3b08eb2aeb3048d8d39d54ef8dc1963db41f4fa89cc1407ed5aa228a1a93
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5688f8aa57505154ba7b8f64a1ab9fdab
SHA182daacee130bcafbc7f62a95eec19e8a9601570f
SHA256e893b85f6f1fce32edd4c68dbaca3514c5996a178510a5531abd39e499e8006f
SHA51214e2d4fc0393be803db8f50e8a1eb6c04984ab9c8ed6de565407b17470f8af9e45a9978ebff8729ff3c3ec464b32e7df63ed61529058c2a808f1040999f6891a