Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http:///home/petik/shadowserver/malware/2024-05-31_50a5352b7254cf929646deb4b0ae11fb_floxif_mafia
Resource
win10v2004-20240508-en
General
-
Target
http:///home/petik/shadowserver/malware/2024-05-31_50a5352b7254cf929646deb4b0ae11fb_floxif_mafia
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 4324 msedge.exe 4324 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2476 4324 msedge.exe 82 PID 4324 wrote to memory of 2476 4324 msedge.exe 82 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1424 4324 msedge.exe 83 PID 4324 wrote to memory of 1652 4324 msedge.exe 84 PID 4324 wrote to memory of 1652 4324 msedge.exe 84 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85 PID 4324 wrote to memory of 1284 4324 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:///home/petik/shadowserver/malware/2024-05-31_50a5352b7254cf929646deb4b0ae11fb_floxif_mafia1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85d2746f8,0x7ff85d274708,0x7ff85d2747182⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,1680865099820033330,6558199331207357843,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5e6a8e791cac11e6a65418d40640f9b80
SHA1083ce5c208eec2fef5374485f6f0b581915ca5af
SHA2569e84d0862fb11111f09d483ddca5a57c519f4f2bf1839f8d84fe892fafd1572e
SHA51233fb76f96cd6dbeaac5f17f975ebf25329af631938527448c0d383ab1ec40055fb2443eae7b94ed3f359d4add4598257e5d4576cc10b44d5a43b14594e16adfa
-
Filesize
6KB
MD5f80758a4dd43754a80fb6f66d7f7c71b
SHA12114da0840055cc952d184fec69ec2ed1ab54c9b
SHA2568d6c6ad6d3cfb1988f1d620be6057e51ae31a88946ef6a78d661ea20e2603417
SHA512ccfa93afda26324ad2e0a76b7fe0341c2d21a20298ded6f609d53837c10a61175e083ab091af89048ebc81bfb266a0ab7188fcb9df267a202a84f9ff5de2f2f9
-
Filesize
6KB
MD5fef9c69b28b07f37ed232f47ac0c57b3
SHA1f0a7b20db66850c11096f5ed525b78b497960f56
SHA25691a33d3aecf40c1d1f4c9e12e9a73d1758796d2a516a9c117c2e6883379aea33
SHA512fc545ec0740b6251f3be7cb8ef617e4f81f39fbd41576f167805cf6c2abe8dc01b3e5f00e8fe2e4e055179140210114b382c8c9a3f6f407d61106af2e97c3e09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD516a7c1753b5a34a196389e2ec9ee91ce
SHA19375cb135991320158756df0c641f643d78768e3
SHA256ebd81c5a7301e402c161d514edc2073da5d44f3039a8b8d048685d3c632cc6cc
SHA512417840db695af3aa7eb48d6706c61d967544bec9b293f6af02ca807486fec03d707fcb695695f5adc5ad05ec91d4edf195a27edf9eb256b6563ccf41a0cdeb62