Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 15:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/can-kat/cstealer/archive/refs/heads/main.zip
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/can-kat/cstealer/archive/refs/heads/main.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 1820 msedge.exe 1820 msedge.exe 676 identity_helper.exe 676 identity_helper.exe 1068 msedge.exe 1068 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1792 1820 msedge.exe 82 PID 1820 wrote to memory of 1792 1820 msedge.exe 82 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2612 1820 msedge.exe 85 PID 1820 wrote to memory of 2852 1820 msedge.exe 86 PID 1820 wrote to memory of 2852 1820 msedge.exe 86 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87 PID 1820 wrote to memory of 4828 1820 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/can-kat/cstealer/archive/refs/heads/main.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffdf846f8,0x7ffffdf84708,0x7ffffdf847182⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3508 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12652455075116939641,12074966586058886605,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
255B
MD5d11edf9e08a127c768843acea41d0bc5
SHA1ff1af9b39de4a3f547407fd9864ffdd2bb6c7354
SHA256217e4d9d1412e45abf7a653f72a5ab8b53bc8fc6f377f52a042668a41abc7478
SHA51292c3f0def567b0e2f2523ed25eb9d4abff06070b8be744fea4a6678f25f292439d7bc0c8015eaa6281b7f43149eebb3d3821cd6d6436598481113694b11ddea3
-
Filesize
5KB
MD5183259d778c8d6bbddd10b9b450eaf10
SHA1370bf0a49ff98fab4a9ce7253f95ef5e3df64635
SHA2567778f65a9eb88db5c6d2b87c7c119ce904d525ebf1d845617ea64d4d81a9db30
SHA512c7c2e0b61e334b9f823b00e1d97abd7226418b1c2a111085ee5ec2a7ebf3e0226befdb1f5345ebf4ee1f367d557cd44ae7aa3e15b9b0904ab0bb1622008ccbbc
-
Filesize
6KB
MD5528c395ea7e40f0035a680078bc5a3ea
SHA1eb8c2d4e9676da07a146534fe5671bbf68250cc9
SHA256c7fb20425b93a2ea9419bf2407229a6acde881753329f83ce6060e7bdba20387
SHA512bd99d990199b7081a6ddaf85f309158d172496750e94205192ce6d4e133d05317bbf3529d8e74025fc2b840817e6e6d2f525553d355e05bd2fcf2ef2aa817d4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5234e78198d365bd89e3e5023baff8948
SHA17cda30a8e6fc5da8dc1ff358f851f98fe47d313f
SHA2567a764bdb29ed6258177124d5023136fab631cc28ceec35f3fcd3faeaa1e69e4d
SHA512e2686185ead26b77f9a6af67f09e92659694273addcf2c6920f4ce7be6636a6a4f15074c052ba0f3484ff8cdb1adae782db37350409bd0d0444938bf1aec1f49
-
Filesize
1.1MB
MD5692fc9d0f02477574c64c3697edd8949
SHA159ee6f9bae10719c4d6a4dd2a4bba367f2b3e75b
SHA256b9a0e06ec7be9a23273b2cb01ca9107e6b8ba4e38fd6a5b04f6bed6eccc0b3a0
SHA512a474e5850021b3aca44e1aae640a3644698de4633fcfb3ffc5e7300b2e26f29fdf65b0eb24b29e235b6340175ee5b0cd795ddd63566a55f634ca7d8edba4d381