Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 08:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://xmrig.com/download https://www.mediafire.com/file/xlsut5gucby7kxn/bta3.bat/file
Resource
win11-20240426-en
General
-
Target
https://xmrig.com/download https://www.mediafire.com/file/xlsut5gucby7kxn/bta3.bat/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1068 msedge.exe 1068 msedge.exe 1200 identity_helper.exe 1200 identity_helper.exe 2080 msedge.exe 2080 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1948 1068 msedge.exe 79 PID 1068 wrote to memory of 1948 1068 msedge.exe 79 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 2888 1068 msedge.exe 80 PID 1068 wrote to memory of 1012 1068 msedge.exe 81 PID 1068 wrote to memory of 1012 1068 msedge.exe 81 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82 PID 1068 wrote to memory of 1936 1068 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://xmrig.com/download https://www.mediafire.com/file/xlsut5gucby7kxn/bta3.bat/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc6ecd3cb8,0x7ffc6ecd3cc8,0x7ffc6ecd3cd82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,15771630764349012535,505770295386255981,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58e1dd984856ef51f4512d3bf2c7aef54
SHA181cb28f2153ec7ae0cbf79c04c1a445efedd125f
SHA25634afac298a256d796d20598df006222ed6900a0dafe0f8507ed3b29bfd2027d7
SHA512d1f8dfc7fdc5d0f185de88a420f2e5b364e77904cab99d2ace154407c4936c510f3c49e27eed4e74dd2fbd850ad129eb585a64127105661d5f8066448e9f201d
-
Filesize
152B
MD5ffa07b9a59daf025c30d00d26391d66f
SHA1382cb374cf0dda03fa67bd55288eeb588b9353da
SHA2567052a8294dd24294974bb11e6f53b7bf36feeb62ce8b5be0c93fbee6bc034afb
SHA51225a29d2a3ba4af0709455a9905a619c9d9375eb4042e959562af8faa087c91afafdb2476599280bbb70960af67d5bd477330f17f7345a7df729aaee997627b3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bb1c49a613e857395f69df7f3b355002
SHA10cdad8031346a62b3e28453e0554cdd97921e61f
SHA2569594e410f2dbf4d14d1569a7e55dbabfa0ab052a56728acb4d1c63760ca849c8
SHA512d34f6d644e6390ade85186dab993b5b34afcc7e79ed54b6264ec18606313b90c5dc100e44e16fa4e8b1e785d574ff4b6475fa12a4ddcf15b2df60a1ae2951446
-
Filesize
544B
MD55b06f9348744b24dcc66b8e7141c4759
SHA1685570f25e2d33f1edeabd6bfe927757a312e691
SHA2567e0d74c1defec2a5bebeaac71dd14f6830dc8ec64727dbe8d50fd7409d4da2e3
SHA5122da8bba41acc7015f317c16cbc1a6b79eb495c4fa8ab3b242523e54d977da3d3d4d3b483fbb563f737dbffa2af7f84c74c09614f124d28cf076fd99840e13c67
-
Filesize
5KB
MD5fb5d5c26976118bc1aa382b99ca00c6e
SHA1e5c7e3078ea326d95f03b8c201fd4208e43d9eb3
SHA256f68e37510a6b1617abca97798682f2a64689481963ba82defce5f735abb4d80b
SHA512917028fb19654685f7981d88b30109397fcfc13b842edf9a808d9c9a5b8233f63ed3aedd85286a0e81258ced544392013818bb5704051e2e2351dc5671e5ccd4
-
Filesize
6KB
MD5c98c3f7fc8b6044fec631a4b07a30ad6
SHA1ba98e74bc27d26090b8e9876590aa43284efa94d
SHA256cb19e148c2f37e58a209d31b462c96f42428dcf051311bb60f809a2d42a5338c
SHA5122f776cbf9cdf7e2bb3b60ace8b8895a79f740b3a4232b7455cb1c4d12fdcd5385899caee1021bc0a8635e9fd273bbad39b2bdc67f81c671922c60327993dd8b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5933f529ef5d48d76baea65b26b2440d5
SHA1afdfb72ede432cf0703df17f258205c4ced6b870
SHA256437a6c243db5fc2ed13320415cb8819886cd7b3b2967eceaa474e9950732d118
SHA5122cbc8dbb55887c62bd1ea90493dae482e284013408fab680076c383d395f4bdeaf53fe430a6bb7c6af6ba8e41cf36e61d2948dfd73efeba9453b163b90aaa23d