Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 05:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://postwc.buzz/au
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
https://postwc.buzz/au
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://postwc.buzz/au
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://postwc.buzz/au
Resource
android-x64-arm64-20240624-en
General
-
Target
https://postwc.buzz/au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 3220 msedge.exe 3220 msedge.exe 3268 identity_helper.exe 3268 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 2596 3220 msedge.exe 80 PID 3220 wrote to memory of 2596 3220 msedge.exe 80 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 3236 3220 msedge.exe 83 PID 3220 wrote to memory of 4312 3220 msedge.exe 84 PID 3220 wrote to memory of 4312 3220 msedge.exe 84 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85 PID 3220 wrote to memory of 4828 3220 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://postwc.buzz/au1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfdde46f8,0x7ffbfdde4708,0x7ffbfdde47182⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8628189110062051257,468455656191246664,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e81c757cdb64c4fd5c91e6ade1a16308
SHA119dc7ff5e8551a2b08874131d962b697bb84ad9b
SHA25682141d451d07bdb68991f33c59129214dd6d3d10158aeb7a1dc81efbc5fb12b3
SHA512ba8de0b3b04fec5a96d361459dde0941b1b70f5be231fdec94806efa3ecf1e8faf8e27b1800fa606dc4a82e29d4cf5109b94109e5ad242ddf9f4671e2acbcfbd
-
Filesize
152B
MD52e57ec8bd99545e47a55d581964d0549
SHA1bd7055ea7df7696298a94dedfc91136e3b530db8
SHA256a50ba35608edc2f3360cc71be0d4b29bba0e3382d1f08f24df5322ce2ad2443c
SHA5126b9b73d983c472149629c842e16e4f7c2f8a0a3bb6dd64837ef647db810ef1beb3a02b15dc1eec2c5de8aee6b3ca195c7d26c432705061c5b0ec7841a5bbf106
-
Filesize
469B
MD53a1ff4ffc6636fa8f7fba511181052dd
SHA107552f9f6a36a158b04d8a0cf8d18be04d24bcf5
SHA256addbc379ab2beff9129b27eb9ef3fe80a2f8ad99749b20df7ddc16bd0cbd3a72
SHA51286350c9a196cc50fca2119751d173e5833f642cb96500e267d7f903c5b34b49d45057d28ded755de1a243be02bab3cfb06fab1ff5e9f1626d152ed5557925284
-
Filesize
6KB
MD568c749799c372e37ba61b6e863ebee7a
SHA10de125703d78bddeb7c835ad78dc1f61f6419cfc
SHA256fac0b3378f06fb66dc6766c53a50912d5f410d723c02970e2cd23531577c96a2
SHA5123acf4e6506b736a081c887cc7a6b93078eeba38baea3265aed15d44f98bc3b81f699f3da3f17efcad7780877c2b714aa91629ea7bbf0fe0e1facf8085b23add4
-
Filesize
6KB
MD5402e5ebeaba7ef092b31e886a826513f
SHA145da3c9faa980154a87096383953c7f5376f1606
SHA25652ceff9a4ffb345b6aa7a74d71efeb171b1e545a1b1937401b98f5e971871152
SHA5120348c573f5704aa84d4f60388897f80bef711c9702f2762d4c03a5aa069005100e79a023c66c232ed67a4543ca49fcd0b3a4e773313ae2de190658db1e1d0865
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b041ecfb2b4280a1d5d8ca474a51e23c
SHA1b5dadac4761af038cba849c2b6e8dd31f100f927
SHA25637a50d789250c64204ef61e9f55636d7345fffcce76077b43158b7fad0fa79b0
SHA512351bab00fc8561183b4bc5663b870ae3eefe93e236f47bf1868b6f26e848722a4aa260bd11a18a139f491456c165ff7e23c57cdccab7573b424538fa843c4c5c