Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 19:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Ran485/biomarkers/blob/1c0da07a271784cdcb890e5a7e4a97f03547e82b/clumping/clumped/GLOBAL_AST_ALT_ratio.hh
Resource
win10v2004-20240508-en
General
-
Target
https://github.com/Ran485/biomarkers/blob/1c0da07a271784cdcb890e5a7e4a97f03547e82b/clumping/clumped/GLOBAL_AST_ALT_ratio.hh
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 48 raw.githubusercontent.com 49 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 2940 msedge.exe 2940 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 5512 msedge.exe 5512 msedge.exe 5512 msedge.exe 5512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2176 2940 msedge.exe 83 PID 2940 wrote to memory of 2176 2940 msedge.exe 83 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 3736 2940 msedge.exe 84 PID 2940 wrote to memory of 1008 2940 msedge.exe 85 PID 2940 wrote to memory of 1008 2940 msedge.exe 85 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86 PID 2940 wrote to memory of 3244 2940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Ran485/biomarkers/blob/1c0da07a271784cdcb890e5a7e4a97f03547e82b/clumping/clumped/GLOBAL_AST_ALT_ratio.hh1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba57446f8,0x7ffba5744708,0x7ffba57447182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6742577716921772270,8426946185292508201,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59510f04b6e7cef47e70092bead7f4ad7
SHA1d401c97eb1eeb409818df007e6724c668c5d4a0d
SHA256da4b062c1bbb8ffb8df51741d182db567a0f80403a062636f8ccc0b9f3a4e1b8
SHA512b1a11c2c35fea1559b4ef6054d422c333440efaf31899e6f3beb3ee17c293a98078070e4363406017b7df7fa7765ac10203f5e5a6c69afc5886c0f7158f81ba7
-
Filesize
579B
MD5ed5f4213c17629776cd75510648fc019
SHA1ebfa685dca9b7c920cd5ad521c03e4ad0ce435b9
SHA256e969795f0e63ec8a35cdf34d5bc43867ca0825bebfed9734943e69b34ed2ad87
SHA51271bcc166ae5a48f7a79aa5de7ecc7e10dce22c39240ca9ffe9d0f9340f40fc2a2429529cfee8b2b5d7082efe94921fa7df3454852d5313ff4093bfdffc189627
-
Filesize
6KB
MD5535107393a87860a96e11d9eccc88aa8
SHA177fc1d76bb72cb177f6365deb3d0700d966350ee
SHA2560afdaf33479878d143d088687daef15b66c5238bf443d0c996a901012ce42fc2
SHA512663978111eaa418a929999fd8a71fb8ee49aacb53df405b21c6a5a5c502951982a4645296873ba13d78b8dfa5898766a4e1739089f3510270123a2ae113f9775
-
Filesize
5KB
MD5c1af88c7382d8658f152797529db6380
SHA192ecb4bddaaa4aaee5e26fc56a6bb7a13a2f28df
SHA2566c885df67db0c24e2a8afe0d6db606506af96bcdd43a2a9e5ca1ad014191b370
SHA51224ef36b24811827291ee9a6bda83c22d4d21c8b5486795190daac688f1fb8ddd151ba5a7bee2e0f51fbda5217c01da9dd2a418bcd4c5a8d315cedae38d79ed76
-
Filesize
6KB
MD546f49c05ae31f6e57e3cd9fde8683af7
SHA16a1c7474565f11da71c0f4c06d0328aef0b0b1f8
SHA25638128ebd991428b93c7fce6b70c983604550f75ddac1d8f053da109a17b8ddde
SHA512601194e2980d35b656e20349b703554fe4d8bf653075346c08d71149acaf504998e3d80b1ee507de9904f31b023c17218ac5f5d4911ed427511226f92b783d1e
-
Filesize
1KB
MD50cf7033b0dfe81c629700769c1830e52
SHA146515ea56a0f18fc697240c120dac469250dea1e
SHA2563751b6f33df6e7591b528ecd09bebac94b9fe46b007392c21f0c6bb275f6733a
SHA512800d12a2caa8490f49dced9257185b2c534e5c1afdd203f544c45e251ec84a6df8a0f6cc7db44911270a3458cac8b2cc5f40b472eb61a0a3d00dedd6d4aad8e1
-
Filesize
1KB
MD5525aa070bc9971e367048e03dbabd7a2
SHA10ba80fe46ce43c8f9da71032ab5305ae282b33e8
SHA2562e9527c3c7aac176079837fc059184b96dc16cf0fe2e23d8ad617d0dfceb9977
SHA512e51bb9ae359a3d7c413e3a3d5e23cd332136f49564a7d5fa10bc199856be12ac8b433bfd42baba197d7abc52dc1f07308d95d9ca29d2587913e6504eda4b3d43
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD56dd5be82613645f868048d28da4016b7
SHA1df3940e0ab040d2013ff09b78c4728e18be19105
SHA256561a9b441546de18d3caa5dcc2d23ed3824dc6c1e58fc9a38988cf28f72475c0
SHA51255dd9b6af511b840e75c8562f5e38b8dcc10022fd2c5b56ac3d50cf89f31d24d55d1071a164a2738bd094976af1d801c26a02372373956e7a9311e5cee3043f8