Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
python-31014.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
python-31014.html
Resource
win10v2004-20240709-en
General
-
Target
python-31014.html
-
Size
38KB
-
MD5
ba628ef04f3ab0f4cf1c9879ce7400d2
-
SHA1
1a5c27517759bda30223702857d5bb47d1474a94
-
SHA256
e6bc163b84187f59fbd8fc525f4bbf824d5e29f05eda2dd2a5e8fe3dcaaac425
-
SHA512
dfef1f59a1c7c7427cf5df8ecf3bee3d5fd4a0d404d088bffa1828293c6a3c49305f9bd938a47e7bedf23f89ba5cb9da4456734dac2de01e4978d7662bc1ff92
-
SSDEEP
384:9mjuDZRsXcuJUQcF0N6JDCw/ld29RdO4p/XAKjofwBiMbba2tdH90lXAK2Zpp9s8:UoLsXcPeN69Cw/MJv0fobfYvEppmyB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4556 msedge.exe 4556 msedge.exe 3156 identity_helper.exe 3156 identity_helper.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1060 4556 msedge.exe 83 PID 4556 wrote to memory of 1060 4556 msedge.exe 83 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 3468 4556 msedge.exe 84 PID 4556 wrote to memory of 4644 4556 msedge.exe 85 PID 4556 wrote to memory of 4644 4556 msedge.exe 85 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86 PID 4556 wrote to memory of 3008 4556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\python-31014.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe681c46f8,0x7ffe681c4708,0x7ffe681c47182⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16393740055891430895,7663833136905395115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
460B
MD5b97da3c5308c5a05d14f3ce4019c6221
SHA1ef77961b1d05f92a87b6e5f1d6ec371ef7524b6a
SHA2561a398b796bbf24cc2a4a7d0ae0694f4f9c2d0cc2462b25f39c93cf992485b3fa
SHA51286d68100442cf22adc06f307f23fc26ff99f39c4c8f1384f67d1923eaec0cedc065639698730f9c7671f27890cc2e0925127236948fc3d4139da57a07a72ce5e
-
Filesize
6KB
MD58f9adc36ba9b96598f7b00d6bf2c6329
SHA165810dda1e532861ebe082788d98bac8fbad5372
SHA2564f6b98acdfb1536c341d4c5ae59b842f80808ca016e9aed005e1bd6b13ff1661
SHA512d204af2a2f7bab3e01fd6eff29f17e40cde5cace2013a7082a2eb0563a196392bb92e72b29aa644a39b60e2a92f42424213d11f79887828264a56b03dd726b2b
-
Filesize
6KB
MD5928669cbf5306be34ba30a7003cbb3cd
SHA189e1d958898745847a7dbbc15ac6d651f3f96299
SHA256c92ea063b79705bb4b3ac91d0634133056ac1573f2efc529d4901a7c7f14f237
SHA512d982328344af25c3e65c45076b47e00ecead5b3f94dbdcdb4b8065b2b4a9ce014479fcabc4618ed576fc8063241a90ce9f4ae64b265acbf6a3070f00b0a13e7d
-
Filesize
6KB
MD5c8cc74369c92c43ccea18174d92a940b
SHA1f0ec46e12933e873e10a4250501e33919740e735
SHA2567c26c561db92273e979793c5405ba255a469df6462122946e63b4e1eee1a3818
SHA512c684a559bd25e85321d001d9d0524171d01616096a4843377b6570d0edda61b53fc8b552be6c01760b84516747172bfe48a37dcd5c281e64360da6fb35b9856f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6b9404384b1a5d30e85870ab036058b
SHA123f532504049e4dce8daebe338d1b919a345d4bf
SHA25653a8755bd7593280cf0bff7b5608b06ad43eb60b3ca0854eb8d07e315ee0953c
SHA5123b27a2b24da599d70413cfe8d7afd983983b61bd460d5d7c54e4d9c4c954a09054cc697dc577de1318b9737526e05820c4d0d27960669070456472723d29d444