Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 15:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/AsjadOooO/Zero-attacker.git
Resource
win10v2004-20240709-en
General
-
Target
https://github.com/AsjadOooO/Zero-attacker.git
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 26 camo.githubusercontent.com 28 camo.githubusercontent.com 29 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4580 msedge.exe 4580 msedge.exe 1008 identity_helper.exe 1008 identity_helper.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2976 4580 msedge.exe 83 PID 4580 wrote to memory of 2976 4580 msedge.exe 83 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 3932 4580 msedge.exe 84 PID 4580 wrote to memory of 4368 4580 msedge.exe 85 PID 4580 wrote to memory of 4368 4580 msedge.exe 85 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86 PID 4580 wrote to memory of 2988 4580 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/AsjadOooO/Zero-attacker.git1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff00a146f8,0x7fff00a14708,0x7fff00a147182⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3048 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13007546382728215277,15541136477748782681,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD56436e39bfffec66d4f284aafd0ca0367
SHA1a72b405ae08171d6a33e34b8844c63ac4314d08d
SHA256003e667871852e328353d1072f0aa58c4fce1dbf5a06552c12c0b6db8167752b
SHA5125986cbc10bce6f68f365fdd5d41306535f715afdafa097fa7aa1c378cf4e7f53a6706105e0062712173573ab8aa2a2b0b1f38a3f9604bd84811855005c768c89
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5c963ae99418328f667abb99f7284681e
SHA185cb26454e68a5a0bd5367f0dce090f91e2dbd1f
SHA256af563ef2f87567ddf911d7cbf50a3317bf83922e52183b9e95d435698ccb940d
SHA512f814de1b0e14298a753858b23b2d63db75ebe3154d7ac95187fe4515ec45097a695f7b43014d2672e275d2d06a306a36af8cf627c50980ab19348f32c92a690a
-
Filesize
580B
MD558223c196701afc75735b15ebf84cfaa
SHA17ed9b5c0024d422f6afd3dfc5273cb12d05e6ebf
SHA256782a2aeb330a32f5fc181da4f577c32e21db2f2034f8f2c770e9b095b584661d
SHA5129ced215f3c7c4a3dfeed91d57dd66dea2706bfea909acac37a80613b417e55c62af63c62e6bfc9d42c9f62f5225071114e0856269ee3ec4012640a5ad3c1fb76
-
Filesize
6KB
MD577b17a28d1beb2063af7e8dde03a385e
SHA1a79a271d502a76470e991ccfa4e58d74dcc8c23c
SHA2568da83e752e99665d50656f268c7a58596c34284b889f2b27767bc08ccb74ab8e
SHA51263722f32bf7b4ddb5a5056b552c9e779cd4a3685857985a55a24789cb0ad618f6504f19358d4a0918a9561a5bc35316f7559da061dbe07c24ca4290a3a1a4b0e
-
Filesize
6KB
MD59fbbe7716f6c9718240c055fe44b6ff7
SHA19866387eb8131620d223fad349be99f013294f36
SHA2560a78fa8c178236153f3bc7a6d61f9879bca80b06f6796cec18c1bb6b1d0d32f0
SHA512318157bb590d6b89383fa149e0475659505a99a55ed8cadce3044db6213d8e0b26f6d92285bdff25114a5c0a129189625657ad8c27fb832b21f8944dbbb31cf4
-
Filesize
6KB
MD506e79c1b20f532578779964c177455b6
SHA15fa2d71c09c0d76d19bcefee6f3e9ac9263e5cfc
SHA256e4c796b8a2aa11592933028c4940816f85e8efa7f6166d242f46858730bd4289
SHA5123ebdd244e29beaa6a0c4d8e43d4728d27dc5a0c5d60ec613e1c611808b7459a22597fb7a8a921580249869dd4a807c3e729848a86fb66176c95370cbe5e64ae6
-
Filesize
1KB
MD5fe2620e9e4c2937f81111424d788caf2
SHA1e6316a738e49f5d0080640b16a76364fc7245ee4
SHA256c5d5c6512204f114d1820f635279cc2d33f17021d69d0df9238f0626e6f62e71
SHA512dafee1e39399114f86a87f3c4019ce0be5492e21c7c95ac8b53dd2c850a6fb8cc5bd8cf9da8efefcf3c0d0e5b97a2c3b900d9e3b69b4f72e275a133740175801
-
Filesize
1KB
MD5982cb9775687a23284e8de444ea8187b
SHA1b3f537d9eda4295768b6738bb0864c31edb8f49e
SHA25640562e3a928120d62bac624ad94a4809103294b8ece9cdf045063bbbf9dddfc7
SHA51242006a0391845184a2b1b44b0cff23fe6549546b4f5d50d151d437c7e23738c88df3bef37eed42657163b92b4f46cc03389087700876956763978f224e269731
-
Filesize
1KB
MD5878e76f3fba21518e54e956f3b14c3cc
SHA1843bfda0a2f1ea3cde159281228f0082ea09c538
SHA2568c0bef2283cc992d0a0a4b615d8ea0fbec084163f9cd2ad6209c1a02cb5c55e7
SHA51275cac16a6e3b972a5feaa4334929f5f34c76046864a6ff4c13ab0052bf8bc1723c0180924cf217a6ecf903af0d11c0f7ef518fc955506815d716f294cb54392c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389