Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-06-2024 18:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kssnew.online/ksr/index.php
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
http://kssnew.online/ksr/index.php
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
http://kssnew.online/ksr/index.php
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
http://kssnew.online/ksr/index.php
Resource
win11-20240611-en
General
-
Target
http://kssnew.online/ksr/index.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 1944 msedge.exe 1944 msedge.exe 396 msedge.exe 396 msedge.exe 428 identity_helper.exe 428 identity_helper.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2432 1944 msedge.exe 80 PID 1944 wrote to memory of 2432 1944 msedge.exe 80 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 3184 1944 msedge.exe 82 PID 1944 wrote to memory of 4808 1944 msedge.exe 83 PID 1944 wrote to memory of 4808 1944 msedge.exe 83 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84 PID 1944 wrote to memory of 3528 1944 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kssnew.online/ksr/index.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb30e23cb8,0x7ffb30e23cc8,0x7ffb30e23cd82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,4171671412699124446,18370719795378373703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD564f055a833e60505264595e7edbf62f6
SHA1dad32ce325006c1d094b7c07550aca28a8dac890
SHA2567172dc46924936b8dcee2d0c39535d098c2dbf510402c5bbb269399aed4d4c99
SHA51286644776207d0904bc3293b4fec2fa724b8b3c9c3086cd0ef2696027ab3d840a8049b6bde3464c209e57ffa83cbc3df6115500fbe36a9acb222830c1aac4dc7a
-
Filesize
152B
MD5a74887034b3a720c50e557d5b1c790bf
SHA1fb245478258648a65aa189b967590eef6fb167be
SHA256f25b27187fad2b82ac76fae98dfdddc1c04f4e8370d112d45c1dd17a8908c250
SHA512888c3fceb1a28a41c5449f5237ca27c7cbd057ce407f1542973478a31aa84ce9b77943130ca37551c31fa7cd737b9195b7374f886a969b39148a531530a91af3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56219af957db72ae779598e954503dc65
SHA1f6c8107fae92514081b098b6a953939cf1c4822c
SHA2564828330b2bab1f1c09544a4f0394b6395cef0dd3167743ab25ba386128e5aaf3
SHA512fd4d7205cdb36bbf6702bda4749bc05206a071a0fb51356a86c0e1f67f11d3b88d63c72f9bb67a08f3e3fa1c688e2f867bf0d2984da3a1040b1809effe920992
-
Filesize
2KB
MD5b6569b66edda96e4782465294dfea6a3
SHA144320d2f246c3d11647a842210b05ffc0ecadc09
SHA25655a612401851f60cced98b8a73f1e11e2238ee578f101e198bcf4ad7e4bb7ce5
SHA512ec16da030624330e8c4cb72d2ee163e1014e32bfa6d297d00020485c81b43ca60805e861d57732a9ccfaea71c4d6ec2f62f148aa95d7f446370a7b6380f3944b
-
Filesize
6KB
MD52bdd534f3d54f7b32584133892276c82
SHA1f727d769cbe6bc9e7e429f3b66faaba0e0aacdda
SHA256bbf085ffd306e810f738905a90069b7a6d1d094370be30f1c618f17c5a262c61
SHA51280a5a7b8e07e9fd514c564a02404650b53240627997020712f94ddabf49599e01fc49c1b10311a8487563e6c2dd9b0fbb5f9a236f44152726f3d74c4f57e0ffd
-
Filesize
6KB
MD55bfa90f48bacf81a6d940c23cb32f9e1
SHA1ec5b5cbd72b4a127ea2c7843c44136436bf0f3ef
SHA25602311bde81fa5f5799ced5540600d382b144a8e31ba4a9f98be993382d3739e1
SHA512624a64a395110757325950016ce33d1f5496568b6ad1d8883306ce6c109036f67afa6ec040de375b2855acabbe8235cc1e2f7e0861335a78acc33d3475ba2c60
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54acf639a2b620b8dd37c07a068821a8d
SHA1a8932590e910962c3341c51c699d1335fe879677
SHA256620ee07ddf8c0f11387d4cc12675e2dc990f07d7fabb8f5b586ffcda95128787
SHA512559728717626f0a7f7af70497f2fadf6398cb6ad8ae9bf4836742260f241aac272a1770342f02d7f3db9e1c6ec39e2994b03edb8dcfcefa5be1d279572bf926f