Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 15:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://z.numberz.in/HydV31o1QR
Resource
win10v2004-20240426-en
General
-
Target
https://z.numberz.in/HydV31o1QR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1828 msedge.exe 1828 msedge.exe 4284 identity_helper.exe 4284 identity_helper.exe 5584 msedge.exe 5584 msedge.exe 5584 msedge.exe 5584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2720 1828 msedge.exe 82 PID 1828 wrote to memory of 2720 1828 msedge.exe 82 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 5100 1828 msedge.exe 83 PID 1828 wrote to memory of 1552 1828 msedge.exe 84 PID 1828 wrote to memory of 1552 1828 msedge.exe 84 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85 PID 1828 wrote to memory of 2620 1828 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://z.numberz.in/HydV31o1QR1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9da146f8,0x7ffb9da14708,0x7ffb9da147182⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,5650785217847302860,649120345846527441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e9dbe056893c7c8c402d8b6712fa0afa
SHA15852a544a3c558e0dbf9abf0c85dd86ee4ccabeb
SHA256e0696f072e033e5c29f8592bbc611388dfc31fff1faf1f1d6e61c8d62871db44
SHA512b9b21232e178ad9c2db04ad476b623a6432a4fde02d279e349f68cf8b89f4bde26f96eedc328fcd11bb1ddae5cab7e0f05fb83bdb69ba42461e3098711a5ee90
-
Filesize
1KB
MD5cd7b6796f8f0b88089889e7ad2851c0b
SHA1eb0248367d85e2b5e9abf6d8cf73668df16720e0
SHA25612f35d364f491605467bee607a272c5c8aac10d1b7f5f0d691cdaebd4e16e307
SHA512fdc3456ca2a2178a3067008bb6a6b0f5071c4dbd07062aa71e478060eb3f86c24a97714dcffac5463cf506130e6f6f2b85e2d3cb1fa74363c3eca8348d04c91f
-
Filesize
5KB
MD5d4f7dea992420a2f427063af8b64f34b
SHA1da9722f34fffe9fee2be3f59a68025e0a35653a8
SHA2569d32f061a1a1aeaeeab511704b46fede870753fc74cb80967478e972ea50a798
SHA512eb75b9f1f8aee2c80af84d957e05d9b979fab8d6c4e08a02b1c4c994d6a3431d70e82797e716fb6b953e9a7c828829a8cbf28022f71a94c4cb0f6a6230f3db63
-
Filesize
6KB
MD597c10ad012e90e536a8fafc371a7e5f5
SHA1ef21884cee8af2fddf6616dee85cb3c604bd3359
SHA2560402e57f619287cb1a4fdc6beaf0d02741c31f92a315e202776e1c2f03ef1823
SHA51239292b24ec68e3f17b08e309d511c89a172cb09ee20123aec126606f68de203ad70accf80b408c5c7421e78622305969db390203365df6dc01ce0dd5741f8392
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ec980f9e13720f26868c3e0a6d85b9f2
SHA1bbaa503ee28744a94b810272f139ce83fdca9be3
SHA25608926e69eb7380bdac67e0970fb83a5ab132b2e5ca90b239937e1b52be4926c0
SHA5126b6fb4013c4357de4acb210a4004eb27a67467869e3f20b9e7d91702637943512420060b363053c4ec404ec1bce5e7b49a4b9b5c8f3bdbc4131d599ed7158505