Analysis
-
max time kernel
480s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-06-2024 23:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://netactuate.dl.sourceforge.net/project/loic/loic/loic-1.0.8/LOIC-1.0.8-binary.zip?viasf=1
Resource
win11-20240508-en
General
-
Target
https://netactuate.dl.sourceforge.net/project/loic/loic/loic-1.0.8/LOIC-1.0.8-binary.zip?viasf=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\LOIC-1.0.8-binary.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 1436 msedge.exe 1436 msedge.exe 4588 msedge.exe 4588 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 1216 msedge.exe 1216 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1784 1436 msedge.exe 77 PID 1436 wrote to memory of 1784 1436 msedge.exe 77 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 1748 1436 msedge.exe 78 PID 1436 wrote to memory of 3704 1436 msedge.exe 79 PID 1436 wrote to memory of 3704 1436 msedge.exe 79 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80 PID 1436 wrote to memory of 1384 1436 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://netactuate.dl.sourceforge.net/project/loic/loic/loic-1.0.8/LOIC-1.0.8-binary.zip?viasf=11⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb39733cb8,0x7ffb39733cc8,0x7ffb39733cd82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1352 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,146888361242909341,18033160371084424532,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e4bf11ed97b6b312e938ca216cf30e
SHA1ff6b0b475e552dc08a2c81c9eb9230821d3c8290
SHA256296db8c9361efb62e23be1935fd172cfe9fbcd89a424f34f347ec3cc5ca5afad
SHA512ce1a05df2619af419ed3058dcbd7254c7159d333356d9f1d5e2591c19e17ab0ac9b6d3e625e36246ad187256bee75b7011370220ef127c4f1171879014d0dd76
-
Filesize
152B
MD523da8c216a7633c78c347cc80603cd99
SHA1a378873c9d3484e0c57c1cb6c6895f34fee0ea61
SHA25603dbdb03799f9e37c38f6d9d498ad09f7f0f9901430ff69d95aa26cae87504d3
SHA512d34ae684e8462e3f2aba2260f2649dee01b4e2138b50283513c8c19c47faf039701854e1a9cbf21d7a20c28a6306f953b58ffb9144ead067f5f73650a759ff17
-
Filesize
5KB
MD5f0751de4f66553bd497e0c4db62b2be8
SHA15884cf8e4022df9cae1f419383575d824ce9a32b
SHA256bb0efbd51cd2f818813f4f8fed50b34573e71a280ad08c065407f9bc401a7617
SHA5124bd79812507e2dae2db390f2d77afcb0e139fbb5313a0de44564acee4a3ffef2f0ca650e7e4ab5d25950fd340e6bd6f996dd7d341dcb577c03551eaff5006087
-
Filesize
5KB
MD5ebe42e40d6cee24496fcdc56ede9e9f3
SHA18abf4043ca2bb6880011fd206a9afa601222e5ca
SHA2569a8d6a84fad53467ff3c07b6de768c11dcdb2db18921f498a02a691270a8592b
SHA51274721ac9adf7afa1c148e971e991a5dab64a794517c6787849ec6bd98df2e8af850bc2d3b9f9baa437664c534c6b037ff2a470da2c17f025a061befb2e65d6cb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ba5317dfa28c755e64808ceba5a1844c
SHA1e965a9d81ee8083e97ea0a48da8e6da56d7df76f
SHA25646d5cd6209be07b0a61902a493e4463eac0f1d2fc7fabb4d4ef18d24036f4a44
SHA512ad675181d773d2f4b56bb57d0bdeb10c01b6c68e3a17ad93dc05ae4be3ff4de68c17b12b251bff5511444f739f2fd0d62fae8e23b6ebdab4e74aeaf0da03f994
-
Filesize
11KB
MD56be7bb7a4fb4241a024afaf1c9a6a219
SHA1b4eb0c477827b98959cf3824d9293a4ca963b922
SHA256708b33406cc14d33640063022a4563fe255c38b223562915ddc72143e8f20ada
SHA5125d800dd8c6146cf8700bdf484472dc696a125d841d88839329d24a17c4587da5a1a70a990c58deabe3650263b15892a81eae2cb7a5f2c1a316410c9dcbe92688
-
Filesize
132B
MD5b587c5bc8ccc9aab375fdd52a1feab3f
SHA1c6fe1f6eb0bce7063bd5595369aa47e773bc04be
SHA25615eedf7d6a914adb59079edf3ccb212af4605bb0e8af0777cad0b812d1a6fdef
SHA512054ebd6918aca533f8be527209c72e364bfbf6393f6b0eeae577d4df0a66a25f50770fba2a035d5fa78440fb372454d997b5b6354b7cd960ac37827b063feacc
-
Filesize
100KB
MD5c615da1584cf050cf81a08d40309d735
SHA1ff00f68b03f7bbc785284abd95a54d5b98f7db9b
SHA256b6d6e0d1dce867836a684a0af278e46ed4a50be49a784ab7bfcb3ed59841c9d0
SHA512127429a243595b572a3bc9153243f39e4bdb088b72ca5b9d3962fb36c031bd42ae7a8a326aaae76e11bb33df56925e3591a4c07a7cbe2459b336a1074b8e9113