Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 21:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mojcitr.myftp.biz:8008/JUDDATALIST/CustomRetCaseMaster
Resource
win10v2004-20240709-en
General
-
Target
http://mojcitr.myftp.biz:8008/JUDDATALIST/CustomRetCaseMaster
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 4900 msedge.exe 4900 msedge.exe 808 identity_helper.exe 808 identity_helper.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 732 4900 msedge.exe 81 PID 4900 wrote to memory of 732 4900 msedge.exe 81 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 4704 4900 msedge.exe 82 PID 4900 wrote to memory of 3228 4900 msedge.exe 83 PID 4900 wrote to memory of 3228 4900 msedge.exe 83 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84 PID 4900 wrote to memory of 2340 4900 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mojcitr.myftp.biz:8008/JUDDATALIST/CustomRetCaseMaster1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce86846f8,0x7ffce8684708,0x7ffce86847182⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7291663952883008012,3902201263666280498,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD55556e6f415b6444c04fccd702b9695f3
SHA1926d2a2b11fb88215872caf258c9d8b0960455f7
SHA256a5000b65ede2ecc9dbd75ff8f3de5f5c8fb04e66304e314a07945d15e9ffa4a6
SHA512c5bd4b92f9d819a00ad6a89d8cc68518e7e2753913047ddad6e480b546d0c6153ca791449f486601cd50083bb315d4df3d2f51bea28450f3e129b28c95fdfe4d
-
Filesize
6KB
MD5bf8400c41b5538d4580e7fe277566124
SHA1faf41b1f5c82733c889c28097c4b2a512869d654
SHA25649708a0417cd5565c70007ad4b3d26c14805c0c14bac359eadf5c944802a83ff
SHA512a70bd6dda9b6ecdc286ac5c6ad610a2605015d288ca622770332107acf3f982db850c771b4fcf98f2d811fa8b68157aac55492523abe94f12e8997b395185e4a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57a2f08c6ab8b59f1c698a1aca44a0710
SHA1fd310dd857158f7c05f3ea405af364c32243cef8
SHA2560f079f3f80ecc4adf921f102bc5587a92ad0af3fa07d26fd1f6b2ddf334228fb
SHA5126068fed05f648331027e0f3fd9416b9e5dec776df7481bd1bf06f4d06a84ab62ad8eb6e29a8f1a2813a7682ff2d542bd1e1b862e06a02fd4cfebbb26d7820b61