Analysis
-
max time kernel
291s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 23:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/n3onhacks/cryptkeeper
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/n3onhacks/cryptkeeper
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 raw.githubusercontent.com 32 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 1476 msedge.exe 1476 msedge.exe 400 identity_helper.exe 400 identity_helper.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3944 1476 msedge.exe 82 PID 1476 wrote to memory of 3944 1476 msedge.exe 82 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3532 1476 msedge.exe 83 PID 1476 wrote to memory of 3044 1476 msedge.exe 84 PID 1476 wrote to memory of 3044 1476 msedge.exe 84 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85 PID 1476 wrote to memory of 3508 1476 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/n3onhacks/cryptkeeper1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8a7946f8,0x7ffd8a794708,0x7ffd8a7947182⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10965925261738049432,17448751115323375864,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f2dfdb4c042c2538757b674c7b53ae4a
SHA1a3fc2307cedbe5c1d0d02ead961fb9fa49ece95b
SHA256d73e279576a805be616b0940c9c6b6ba293bd5699357ad7f379dbcb870414d6b
SHA51205c3cce9b4fbf82276d5bbbe14d5370663392da9c0712a37cb32943e21b76c0cc1fe12a1ae2199f4460e2a007489027320fddf7a3fa5a6ccdb7d778f09e3f614
-
Filesize
579B
MD5e0c845909d433c39be77f8f8db9c6503
SHA16089bd5f7665b590356aa3030c110ffdf4548b5a
SHA256c7ab85752605e0cf345acb17740eb18b8956ce0b331461067232e29d5a3e4844
SHA5124009599399384132a6ce991333bb4a3ed20bb05893f5c3bb3a26f7c54f346679ad1a26a78cc782bd52cf9a5bb86fa95f05f4ace2622752452f17391bfe2e41f1
-
Filesize
5KB
MD528585a8dd9aeff34b4b89f887ab1b693
SHA16c83a09da973e75a66d316acd2d1b801e9d1a3a5
SHA25664a20106ed07c37742c224b387b75928a7388e7e7d5bd3c9dfb4c29dc767f9ed
SHA51279692f78e9e2e8da68e1ff651f8d93349db0a97e6483670781d96a095922d53f032fbb52d605317c8c69ebad43efed176c853974688a8d1afb2ccc20e28f46fd
-
Filesize
6KB
MD508ec9845d14b3ac859c2f45d2823f822
SHA15ee9bb75ceab31f4c4652d76032ecfac13cbc58b
SHA256f17a5bf86f5c922d0242d2bc59611a7d6e225dc0d0e1e32064a254debbc163ca
SHA512272ad9b89ae1ea292d3f58711535e3cb2da7a47396449521d9c9aeeadc4e5579cd4efa40799fc89e14de5e1231b267812dd0740c420ab6e0196bfec097eb034e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbbeeb830014929fa6ae41184a25d7a2
SHA1709a8b785fb0b7d38d5ce65eb9fb06f6ac6ecee6
SHA256c5a4d06046fb3aa10a90ca61121ca690470b72b0c13cbc29ebc11608a9cfaba9
SHA51284688eb9333f2876633b16c0407ec5f8e9e56058855a6bd3cc3f60e8419059290b0653dfb9ba41fab59aa780bdc17e23768947a6dcc1cbc1170f927548562c05