Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 16:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://uploaddeimagens.com.br/images/003/388/387/original/perigo_3.png?1629340273
Resource
win10v2004-20240508-en
General
-
Target
http://uploaddeimagens.com.br/images/003/388/387/original/perigo_3.png?1629340273
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 1668 msedge.exe 1668 msedge.exe 2220 identity_helper.exe 2220 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 228 1668 msedge.exe 82 PID 1668 wrote to memory of 228 1668 msedge.exe 82 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 692 1668 msedge.exe 83 PID 1668 wrote to memory of 2544 1668 msedge.exe 84 PID 1668 wrote to memory of 2544 1668 msedge.exe 84 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85 PID 1668 wrote to memory of 3616 1668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://uploaddeimagens.com.br/images/003/388/387/original/perigo_3.png?16293402731⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe92d846f8,0x7ffe92d84708,0x7ffe92d847182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1858633385892859456,15902654248496896595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52b27664cd6f8b8e9fbf9f9a78fa65ddd
SHA1adff861cb26dd93a1fa29d121b5fa8e85b894429
SHA256daa17d2a15aea31af1a3cb70cbcd6f509aebe7d51bed9a38c48eb85c8b753818
SHA512b8a2519db87f56251c8bb512f87dca9dfbea279795d2a347fd2433b4960bcd58e1c1eb3f17d0c64facf13bb72c22d49d97f389f88295aa04ec7bf969f1c3bcc1
-
Filesize
566B
MD5b2e62ef9f1783736d1c70a3f7a3ccc14
SHA1c1934cd7ef72787fe8806c8ff7e0b57154a55f4a
SHA256ad9d2d0216e259dd2592392652f92802c6e3ff9376ced4fd0b2ebbdd34c29d7d
SHA5127e85d333cc5e8ed14eb6633658f792877238dc31e6dff36d830d5f91c676efcab9ce3462859c56758a307eaf625146ed0db2585c50f0eafa690c6d56b567a8f0
-
Filesize
6KB
MD5307ae0438a6107a926a6791146c869dc
SHA1690d66aab52cbc55530b0c554da1ae6622de2022
SHA2562563d686400866961f547a9bfbbc89a7581167687d52cbac650c8443ac51cf25
SHA5126d0e86caf63038977840dd7f377a71a736fbed0f2303195e5414f035b58ffb117909c8ee1d189272765ce8c11611af3af4464d5253015c23ce4bde16ef80ffca
-
Filesize
6KB
MD5d17613536204b92cb22db69340ccd8e2
SHA1cf3079d80e5474872d9773ffeadae24cd76fbeeb
SHA256e197fe7f3ade5b451b87d5bf853a3805ddcfd7391bf80f2b1893c3564de33868
SHA5128f7af3ff03c65ea3eebbdfede79139966e39a88b17f596f48df2a98f367d455d43b0355129233b0a3aca6451e36681432f317af3f919cc291f2feb7377bfffc2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD575d90ccecbf53f807841c1a1f27a089e
SHA172866a0b16e93be2b00bbe2a53853fbf224c66a7
SHA2565dd327b5adec1139cdbb391e7fad40e0b1b6fa7660b0beafda6d9ef022ed1cbe
SHA512a386bb6ac4d2ad434d35ca114097b3b5c2a1080418d80e1b418f5ee89b9440b503beed47ecaa4e972dc617356057d07f19ad4cef188aaa66603f8db4027db9d2