Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 09:06
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://litnet.com/out?signature=2c1f4fb3a510da55&verify=f0d85a74515d878f9714518b56f64f83c3d478981c8004fd8a36ff05f77ed04b&litnet=domain&url=https://cloudflare-ipfs.com/ipfs/QmWzkZziWX8uBn2MYAfyNNZLUCCB2Jzo2UFc1oirse9Bou#bWVyZWwucGlrYXJ0QGFkYWxsaWFuY2Uubmw=
Resource
win10v2004-20240426-en
General
-
Target
https://litnet.com/out?signature=2c1f4fb3a510da55&verify=f0d85a74515d878f9714518b56f64f83c3d478981c8004fd8a36ff05f77ed04b&litnet=domain&url=https://cloudflare-ipfs.com/ipfs/QmWzkZziWX8uBn2MYAfyNNZLUCCB2Jzo2UFc1oirse9Bou#bWVyZWwucGlrYXJ0QGFkYWxsaWFuY2Uubmw=
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 868 msedge.exe 868 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 3908 identity_helper.exe 3908 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 460 wrote to memory of 4208 460 msedge.exe msedge.exe PID 460 wrote to memory of 4208 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 4612 460 msedge.exe msedge.exe PID 460 wrote to memory of 868 460 msedge.exe msedge.exe PID 460 wrote to memory of 868 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe PID 460 wrote to memory of 884 460 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://litnet.com/out?signature=2c1f4fb3a510da55&verify=f0d85a74515d878f9714518b56f64f83c3d478981c8004fd8a36ff05f77ed04b&litnet=domain&url=https://cloudflare-ipfs.com/ipfs/QmWzkZziWX8uBn2MYAfyNNZLUCCB2Jzo2UFc1oirse9Bou#bWVyZWwucGlrYXJ0QGFkYWxsaWFuY2Uubmw=1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:4208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4352
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵PID:2696
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:4120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5218099642450128488,11098973604543138342,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5dcb864445601343f6dd10aec9ea969b8
SHA159964e0254203759879584405077f6d7d3b9dd83
SHA2562f8af20b79515e019150ea75038b122f23f8cd2263260dd83469daa89b1c68f2
SHA512b4e580c25644e19586d20cc0b974023c544ed8fc45ca7f92425f14c42b56c6111e4b38dd97f5d71748d10bda57a6ca157bbc46ef3bcb191959c7fd386b5f9ff2
-
Filesize
5KB
MD54dbed4365ddf4286cb49fe1b61c1f8b5
SHA102db9edf80abfe1cd2291534fd7e95a77ac43212
SHA256d354ca1d563c70175dc38f24c39214e829749cf815f2ecb9925405e117a9c464
SHA512ea8f522f5099dd2761f1a0a65e34dd7f29a54fde1695446d3909d21a2f2559ea8b023d4ee45d12857149958ac1a5446fc87068fe587b93ea0be1afe577bab161
-
Filesize
6KB
MD559493e399faa17970d9aa4b2ac1656e1
SHA1b76e898b3e67c46e9d99c2768e24efb3c3440703
SHA256cd6f7f6e4c16356a08c7515ce77f55cff85cb197748488284d790116570f704d
SHA512b5d0a4cd7265854f640315365b192639f8d29b53e48134dc77a24f47061756466cefb1787b13ba7e9ca2a34cd084c8f973836812e729a7587fd9c30962a1109c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5276f1f54fa7aec5baf6f978a1d00152f
SHA18ce4249d728dc9ad79e833462b4254d05168efb5
SHA256f36095247373d7f02eda4bb933a3c2e29d0c19c40858f6f4b4ae51906fd30055
SHA5129f6aad1a1c1dfeb89e468b3e3d162b2a6f9326209c2b52ff8303bed5ea773b22ed645dd100c10e95097384612270baa562920157950ce4a350c85bf8f8fc18b5
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e