Analysis
-
max time kernel
25s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 17:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ptoszek.pl
Resource
win10v2004-20240910-en
General
-
Target
http://ptoszek.pl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 5004 msedge.exe 5004 msedge.exe 3216 identity_helper.exe 3216 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2188 5004 msedge.exe 81 PID 5004 wrote to memory of 2188 5004 msedge.exe 81 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4484 5004 msedge.exe 84 PID 5004 wrote to memory of 4192 5004 msedge.exe 85 PID 5004 wrote to memory of 4192 5004 msedge.exe 85 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86 PID 5004 wrote to memory of 380 5004 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ptoszek.pl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2b5346f8,0x7ffa2b534708,0x7ffa2b5347182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5626981197723849407,16000121409000612360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD50d0e265370353ae05b5135ae1e66de0c
SHA1cdbc9e5757a7a2f7d9ccc051eeea4545f1c299e4
SHA25628dda9963561b067763dcb5dabc40db4a3b554beb289a48a2ed635d2de8577f3
SHA512b167b04d1abc7f8ede875e5167fc2ba155bbae8eb212a0f333403710f8817af446fb88cdf88b42d2399a44df9611942656a349d719186581f4b545a29d5fc30e
-
Filesize
6KB
MD5636bc87de514d42b0465e04b83facbab
SHA150e64cdb18067f659df058a87a1f2839c7dea29e
SHA2565d16e30dcd8ff3c065519b4f6159e96316ff4d801f089b4a1d622599cc39bfc7
SHA51228e64a9249af204b2e63a367921185306c6a428860cfde25c124ef3eebe8e18b01a1d970e12b7b3ab7e80d30c7db04f7c66e9a13b968fab6a5a0c2188a597432
-
Filesize
6KB
MD52d5011a92cc5cdd3ade910c6d7bec4a4
SHA172ffe7524d3030826ff3f9c2fced013bfb33ca55
SHA25667c496e94964623f52230fbcea414a7fdb36078bc33a325198073e313cc5cf23
SHA512113d6d66cab4c5cd6dc3e5a4c5277a9aba2220d6db18374d1f4729ce89c7abe754d191d4d3f4b59067a45872ad7a1f113e980374cb12307b65174d26708f86db
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e52ab44032c5f35ea712c4041ce3a003
SHA187185da92c67a1768c5145b81e7d0b14fbe62211
SHA256b1d82aeff6147987571083439e3fe6380a9eb2a036df5a8e2782c8524a81eeef
SHA512f82eec8c0a0220877a9807e3eb97ae0c27e82025aa5c590cfa196df329abb20d099846c1eda812cfec8378f1e19999a0976300a95d68c6bbaea8de35e8b6eb5e