Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 07:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://2.16.106.207
Resource
win10v2004-20240611-en
General
-
Target
http://2.16.106.207
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3916 msedge.exe 3916 msedge.exe 2784 identity_helper.exe 2784 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2104 3916 msedge.exe 82 PID 3916 wrote to memory of 2104 3916 msedge.exe 82 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 1608 3916 msedge.exe 83 PID 3916 wrote to memory of 3260 3916 msedge.exe 84 PID 3916 wrote to memory of 3260 3916 msedge.exe 84 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85 PID 3916 wrote to memory of 2200 3916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://2.16.106.2071⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bfd646f8,0x7ff9bfd64708,0x7ff9bfd647182⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11240722465940092645,393143381834010168,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
268B
MD59059c0a8c6f631b36f23abba40adcfd3
SHA1ad7a169136016cebcbc2352bfd6befcb59a15a58
SHA256d586f398691f03e73be75e05c7ab1fe39e01a43e9ce590b7708f3b3b77564fb8
SHA512fe5034c21c9535a38e10f3cc331260294f140ec05a3c36f01294785ccd8baff97ca377e297c0b59297f76a2d8434a79044ad443201e15a14892b4c5c370c9c30
-
Filesize
5KB
MD531452398a06571b76ec6a5c59ac4bee3
SHA1409a39253aa91dbbdb4c5cfeac0a0e6451f6fd79
SHA25625767245fd67809d92d44bb0be6cb8077f7ad820f268efae06bf534ab4328838
SHA512584f41bab160c9c00e6fcc5a132400712656a890071a21fdd4b76190590a420ce67e389a9cae77b7e72be02a8633a2496faf2d6aca6b137a767557ec6374d1b5
-
Filesize
6KB
MD55b30535359a26d3a4e63dfd538e924b5
SHA110367deb7db1a70d77028958bccb1218fee8601d
SHA2569183fc7d4ffbcf886c69ec9f06be367c1c0d8bd229db0d3c34addf329e1d30b2
SHA512bd1f27645bf727201089382f173d8e2a9c24371f9f4b512ad14e034ebbca2f48c6af8ce1995762f7cb9c16c785f2dc9e22155a8794ae60a23661de8e5894adfa
-
Filesize
6KB
MD5066b220fccd77c82ea7825181d32b692
SHA1a373cb1b60c349d09625ab1156596d7d7469c2c6
SHA256f1a8755a6ea72d32a47a47365233e9aae98034b8549842ddc67413895fc41580
SHA5125b935d2c8ea7598ed4ae98f7601f40f20e2ba9c49c4976b9e4cdc45255ee646f8eabf439711b3ca9fd05525bd987c8ff3626030e3c41b55e29fdc5118604d1f5
-
Filesize
8KB
MD5c1b0134bb2314215b366691c93f9cc7a
SHA199d273d78146d295f42f00584b92d6ee3707c35e
SHA256f89dc1e995c4afb1f18e0543915d96044d868e94f0917fd8d55952557ac4ca1c
SHA512248d12390e53659b668f6b1570515571ad96d6a06c129a662d19db61087b2212c757c9115d9f584c5aeed3b419ffac0c501a824494e9689b2a0a8225b13c4365
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9142192849c5a3d3276dd1962d73689
SHA19eb1cb489b8a8e89e59b416d2ed563b495d0fda8
SHA256e90763aff155e13676f2a7abdc2c6f31092d93fd1ed0cb2504c270658629f74c
SHA5126371bfa473caea2401a8be8e718a91edc7d4565add0b49bfc12f57184a90312707113cba9c86dc7a453541eb4bd938b657979cced70ae37f836451d7c69aca49