Resubmissions
16/05/2024, 02:00
240516-ce3hqsfg35 1Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://91.92.242.200/3.txt
Resource
win10v2004-20240426-en
General
-
Target
http://91.92.242.200/3.txt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 900 msedge.exe 900 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 3812 900 msedge.exe 82 PID 900 wrote to memory of 3812 900 msedge.exe 82 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 996 900 msedge.exe 83 PID 900 wrote to memory of 4600 900 msedge.exe 84 PID 900 wrote to memory of 4600 900 msedge.exe 84 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85 PID 900 wrote to memory of 4896 900 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://91.92.242.200/3.txt1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc113e46f8,0x7ffc113e4708,0x7ffc113e47182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17459593250720747543,5045098944213510976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD580bb57920fdc2c4f94042126c5780f98
SHA1ee7ea2276ccd450c86bf865a7113bff679cb3859
SHA256af151f4ab0fe69eb5caf7148cfc090a8144e17245eba0908b1e99bb46bc03f48
SHA512ac166b27fe7815657877a75f67b2a792f36e30b5c2e05fdefae733173cbc51c2d6ce4c59c66035698c220c46c8b535c20d4c6a3a4b9ff16141b069e7a941fffd
-
Filesize
6KB
MD5af935025f9c6234aac28ba2da25e1368
SHA15550666cac4fecd385f64d0b9a23422348b0a824
SHA256210b8f65e424ded56fdd66784be7f46d4c3ace883ffb1950b515355748ba5ed2
SHA5125a89fe69fd37264f52af834c0ee3ce237286e05a1068e1c7f0246dc5ec87585f73ef12f7f19e2a74a4ab636168869628ab694aa3c10715b46ad14597a0908481
-
Filesize
6KB
MD588f3f4e3476a0b01df3556f5308ddd01
SHA17d1c02c5b18ace31e71c95f970a07f724797fed1
SHA256f5883a39a716460cbc00ce37780c40ab0fe9debded17176ad579b022af5da32a
SHA512df6d879c367a81c63dd05d54560a5470ecac530224ce8e595118d92ce842a2e1d0e04b984498e24c8721c4abc9f33b526e979b5966ea87eaf1585192a6932522
-
Filesize
6KB
MD51ef097313b4ad2c2b6bcaa2f862a9847
SHA1dd4899ed2eedb4ac8b1f0f7db85f65df5db86c3c
SHA25635482eebbea69d7e3d19fe511641a727fc0bbc709dd5325fbbcbe19631543958
SHA512536913c74b3e33d4b1ead1236952e3cdbdc6ba3dcf7300bbbcdb0dbe41b48c49093b474a1df511f8b5238410fe9b2265b53a6bbc3b3c34fb97543a8a66f52a4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e60d887ab0c29af6c1986524172eed53
SHA132628fce39fa28b8354045f37a6318207684dc5f
SHA2560a56f44a537586d0de8b9d193091e24cb3515da64958a21e8ed907fffee37b81
SHA512a3465029074bdbeb7f620be2553791dbe3115d7ff83759194dea2cf8a3bc63da3262f3e6581782bb44a295bbb1ad7def4c214d2c083831648bc8c2578a3dd529
-
Filesize
11KB
MD50e38d023de177a51f00cd116e3e0bcce
SHA1ead733bab525626d9cd688be5fd95ad2df0e1330
SHA256f4576f65ae6fb9ae44b1821935b2d2879a2e2b6ad7074f28ecd061677a6ef756
SHA51273ac48df2e38c8a2b31e61960cb95308d1330399de123379cf8bdbcb659534c9cf429740a61fd0a382d248340dcb617336ca5b3440de1eb25983969c510b46bb