Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 20:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/amnezia-vpn/amnezia-client/releases/tag/4.5.3.0
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/amnezia-vpn/amnezia-client/releases/tag/4.5.3.0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 1988 msedge.exe 1988 msedge.exe 2804 identity_helper.exe 2804 identity_helper.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4580 1988 msedge.exe 83 PID 1988 wrote to memory of 4580 1988 msedge.exe 83 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3456 1988 msedge.exe 84 PID 1988 wrote to memory of 3688 1988 msedge.exe 85 PID 1988 wrote to memory of 3688 1988 msedge.exe 85 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86 PID 1988 wrote to memory of 5044 1988 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/amnezia-vpn/amnezia-client/releases/tag/4.5.3.01⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,123789782571104662,3748426551445095437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57d29f3bf03a92d6cbe14bccf49bab08d
SHA1e3b834051ce6a58dec5717535ec3e67fd2f8591c
SHA256264b7c3c05aafebed20593f7cfb34e1d2e8f458842b64305a6f61f0a041aad5a
SHA512ab403e8cdb8185cd036448afc49cd6bda0bda11eaff3a095d4f8d1f71e9f3654fa5f38d6bbe35d6fb07414324a0f6d0998a62a3c0f7019f0bd03e786d762a9b5
-
Filesize
496B
MD5d22266ba3d8db30279b96944f0cec985
SHA144e288cdfe75a5e8299ce32e75dd9e0705cdbac9
SHA25677873629fa695e434160c86ae9116906ff65a97666d7d35a3ed63221b627c0bf
SHA512d463aecbdac835dace5544b4267c86c2ed7d3165ba95095db6dfc3a25655f2391fa202a81d37b4a76a36f04456ed86df137302ad0e456fd59ecdfee3c69c6c1b
-
Filesize
5KB
MD5205d6f48d936f685b8f5d261e67f4564
SHA1cdd6b3232768de6b36aedc8598ecad2cf03eaa5e
SHA2565f78eca8b6dbc388088c47260573de60a28339b095b3c433b2e7a70d75503ad0
SHA512013c18d2f7b6df457d696a0bf4d6df169d9ca4df96d03196807f56cee93c15d0f5f0b109fa7798778726abf8534341767ada48e15b1ed769c6be9f701ae59644
-
Filesize
6KB
MD52a9f8bfb76d450331a4e2509745f9cc5
SHA12eccdd5390b6ac7ffed54cd19a07a57608c05a58
SHA2562caba57580e2cefcdd45086328ec7c20528b30272820290536e0e275e229e1c3
SHA512691a0c668faff7123abd8126838a734ac3781e8bb965affa9b98896961c75af0ccde96278498f8882a053cdacb2a9ecae9932ec7006f46154eb1248052d315f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58505591fd1e2c58fd7089803a523bb5b
SHA195fd25b56e0e7ef574993575ab17c073392a4cb9
SHA256e84ca284f8a152255d4b14fff2a6fb49153b365abc9ebbcd9e55522913f1284f
SHA512135e784670d2cb7300d20dbb93fa5515afa465ed615bf3a45186906c30b1176ce88bb5657c8d4f7918dc6fdc24294f45b21785b116d057830822c9e768907c33