Resubmissions

03-10-2024 21:09

241003-zzn76szfrh 6

27-09-2024 17:00

240927-vjaydssbrm 8

03-08-2024 16:20

240803-ts4fmatapf 6

03-08-2024 16:18

240803-tr5bjatalh 6

03-08-2024 16:16

240803-tqxkastaka 6

03-08-2024 15:43

240803-s6b3vsxgpn 6

03-08-2024 15:06

240803-sg3jhsxbkm 6

03-08-2024 13:57

240803-q9r75svfqn 6

03-08-2024 13:49

240803-q4rpeszcrg 6

03-08-2024 13:46

240803-q2zbgsvdqk 10

Analysis

  • max time kernel
    36s
  • max time network
    36s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-08-2024 15:06

General

  • Target

    https://github.com/Endermanch

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Endermanch
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff98133cb8,0x7fff98133cc8,0x7fff98133cd8
      2⤵
        PID:4056
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
        2⤵
          PID:1572
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4568
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:8
          2⤵
            PID:5052
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
            2⤵
              PID:1440
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
              2⤵
                PID:3900
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4648
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2312
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                2⤵
                  PID:4432
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:1
                  2⤵
                    PID:1100
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,5773923626186046353,2587632614006676554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:1
                    2⤵
                      PID:2176
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:732
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:4740
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:4884

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        0487ced0fdfd8d7a8e717211fcd7d709

                        SHA1

                        598605311b8ef24b0a2ba2ccfedeecabe7fec901

                        SHA256

                        76693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571

                        SHA512

                        16e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        5578283903c07cc737a43625e2cbb093

                        SHA1

                        f438ad2bef7125e928fcde43082a20457f5df159

                        SHA256

                        7268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2

                        SHA512

                        3b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        1KB

                        MD5

                        061447f3bea09cf6b86663e656856508

                        SHA1

                        9d459b39f20b5f27805c4b8491dda048e56ff9bf

                        SHA256

                        cbeb7ee2571f685aa29f0949642e9bbee587013982e3a862cdb31e296a7f3aba

                        SHA512

                        63dc8e05cfcacfe5f16d4916cf0c09289bb01b6c06a6bb757e5245d0c1efed705431a9323a0882c683671621b846516cfc584ca8e9573ca311eda07ef36c8b32

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        5KB

                        MD5

                        3ede7a07c55722e3c6f76761b0a087e8

                        SHA1

                        dad41f6b29250e01fbeead9b5f4a44bbd2b6b3a1

                        SHA256

                        5c4fc175ddc4573ded7c49524bcadbd49b8400b86e5c89656731400f6890662d

                        SHA512

                        6972197d6f6b249b95c7a754109021cd2f8009f09c561058e598b74c70060ccc65041c5c2670dcfa94a8c49975c810a4dd6913baec7673d0b83d8736abba1966

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        9da48bfb53e70e7782b1a9040fa8bd42

                        SHA1

                        7b0c114e985cfe2126b1759cb488ea43f9918c5f

                        SHA256

                        c45e9a38c3cf2e8817dd78868d19c56d4c1fe8524531d52c4783f92e08ab8b7e

                        SHA512

                        7e84b7bdee1eab16e3bf3e4a11955df5ee0a02c9883cdb660b095b2baac8fcd5061ea98eb7ba3786db4a71cabfded52174b17a3fd285f4fea70565159f2a6ee1

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        8398ff40a23edf27f0868dbf10076b55

                        SHA1

                        3274a28f9143430b0134250fad229631c03dad0a

                        SHA256

                        48dde9579be1a8a88aef646790131af8e8f5be0d828040cd0fd6fa53a2c61d62

                        SHA512

                        1538d70f6f7c5d78c3df95713b104d6dcab5bb9aa3a033326d67b73f18aa951e6189109ae6d7fb419d75b554fde204fae68697799ee453df9b988ab5365d6a91

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe584f15.TMP

                        Filesize

                        1KB

                        MD5

                        b261ffd3294a0f5fd105b8b4372c11e6

                        SHA1

                        e72ed0b85d7dc3114c47af4e9e8d45560e298cb6

                        SHA256

                        0ef003012ef1716027e1a2bd0dc6e0d9550114d5e5fd38d26b8539039447cd7b

                        SHA512

                        356bbbb471bfc5914f7f26199539a2c88328703ed309fd5658c10a85ced6b0f9318f8d094224f775321827da942b5d6ad354bfa7d9a722b46e5ceb132a72f02a

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                        Filesize

                        16B

                        MD5

                        46295cac801e5d4857d09837238a6394

                        SHA1

                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                        SHA256

                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                        SHA512

                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                        Filesize

                        16B

                        MD5

                        206702161f94c5cd39fadd03f4014d98

                        SHA1

                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                        SHA256

                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                        SHA512

                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        11KB

                        MD5

                        20f6acd7b0fadf2f88ef5863df600fa4

                        SHA1

                        8703ccbbecc264955d5f526b6d187f2943a458f7

                        SHA256

                        f6ad738c5e119c86a71720a47236f29a4a0e9f3eefb5bbde4b20261dfc8f59a9

                        SHA512

                        e2440213b78ba6b0981b6005939ecd5227870abc1b4c406f692b838f92cc3b558c18695dbabe7cbee1df2890fbaad67b9a066cbd4cde439dfcf4299f4f5438f7

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        11KB

                        MD5

                        152c033fd12f6cbb3cac80b5a55b0dd4

                        SHA1

                        aa8fce6a3b7f22bccd6a9c9de4415c62f62bc46c

                        SHA256

                        a9b6eeae4d9e4896c2260599a64f717f4fb56a8a681c65b1ba033204141a264a

                        SHA512

                        dae516f44bedc31a769e9f79e164232cba91d91eb9359ee6d1fd66087c2c39c97ac06c560792737821c2e7f1f1f6f417d1973b615ce85642734b73a8a7360eb0

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        11KB

                        MD5

                        aaeb44e4fd08e322a6647c93353cc59d

                        SHA1

                        a801478d9a63968733509167cfaf689d9993129d

                        SHA256

                        4896f4d9c9691bb5ec7f040555a9a341410231797d5a4848fe2e035080985438

                        SHA512

                        39325ea5dccbb8aac61b81bd7f981b0182440240f50f9e07ba7aa233436f0ec82380d66f088e8ff2b9a58fd620dc055feb01a7dde1e47c7a117e932d010d2b95

                      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                        Filesize

                        10KB

                        MD5

                        06f54da138064bcb87a50ea5796be0bc

                        SHA1

                        149614dcc0cc8a15d12e042639d53d364b692f5a

                        SHA256

                        fd00cc98658581a6d166ce94e14f68079c4a2948db69e5ac60755ac8c50c1f50

                        SHA512

                        530073a003f19a93945cc2d663cd395744c98b3d8377ed6fbc237be0b42b7ec23544fe149435e3d5d47b8d385c2a9bd1e2605222bbe2df0d3233edf10550202d

                      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                        Filesize

                        10KB

                        MD5

                        2464a58269a134f2979060e336390b5c

                        SHA1

                        31d3185eb35ec0ccc4ad52f5cf0e278183315dbd

                        SHA256

                        554d683b35a8120871871ef5733e307f50400a424889bc1caf8b4375fd3bfc00

                        SHA512

                        9d93b63d2e7d55fe88bf6023db7f2c4581ebd9b03e2a17abe39b381eee19ca71e5f2bf85f19b022afe06936d2089ef1c5eeee0607ac3f8d1e1657560afb8666d

                      • \??\pipe\LOCAL\crashpad_1436_BAVMVADEJPEKUENW

                        MD5

                        d41d8cd98f00b204e9800998ecf8427e

                        SHA1

                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                        SHA256

                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                        SHA512

                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e