Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 23:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://guns.lol/crispyboi
Resource
win10v2004-20240802-en
General
-
Target
https://guns.lol/crispyboi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1056 msedge.exe 1056 msedge.exe 728 msedge.exe 728 msedge.exe 3052 identity_helper.exe 3052 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 4940 728 msedge.exe 86 PID 728 wrote to memory of 4940 728 msedge.exe 86 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 3236 728 msedge.exe 87 PID 728 wrote to memory of 1056 728 msedge.exe 88 PID 728 wrote to memory of 1056 728 msedge.exe 88 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89 PID 728 wrote to memory of 4048 728 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://guns.lol/crispyboi1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11421858167444732434,15666665023740867241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5b343ab8-1ad2-4d36-a880-affd50dcb749.tmp
Filesize371B
MD54a9b155a1d2c942bc0c03056c9637503
SHA190dcfed364ac4652527b4b09a797c9be8b644275
SHA2567d39f6a33457c7d5e66215c361620bf9e20d1bcf0d7548ed4d83aca6b430dad8
SHA512fe627a3b9814c24c140ffc487736bb98fcbc84882d86b3cf17e832ee2c33eb522d2d55177d2a1a913e5483db8597667dff6780fe75824b2e7593c2765e0878c5
-
Filesize
22KB
MD5249cd8391d1be217b43210942d16b3c1
SHA17b5cbe76d3afd8835fb63c9eea72033ffb0a1c2a
SHA2561dbbb439adb0249c0704468fe5f3d711a622029fe2480ee7ce33f7f4f69dacb2
SHA512922876ebaa39485c8bc7a923e59fb819d49b6676364401a64942f9155603ef4ac0cfb5c480961b55d7e0291561632e6d97c7af21f21cb59b7f3bb62b06b3ad0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD535ca0c991dd12908720fd02df3c80ec3
SHA19c8ffa94f43e5a99b0b1d2ee7a3c908c767748a3
SHA256c32231e0e170992026529e8c5ee8548025661cc42bab78e25730a62dd2dd1150
SHA5122bdc6e713f2399c6fc08b8ebf4a1f24ef5a3905f2c8b3596b07f727bb0b0dd378d51fb5073b2aa6d52296dcf63873e195356e2f0f40e0b4aae37591ba6b15eaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD5b7d7838e1f69026d6bfeee20404ba7c1
SHA10d84d822f28ee1f90c705dc83dc67fd777a6f1aa
SHA256effc443ce19f26703e5ee30b971015827b93e1887be54deeb4eb5bae6680e40b
SHA512132dd643ac7bb087378d87251ee6e57dbed15ad42078046e19fc8c5cfcfba0405137852f242a802931836259357cc67f00a1ad683bc7f72221a820d1d335dc9f
-
Filesize
1KB
MD53abe136e0a2f27cd15623c138dbf7181
SHA1f8acb0a29d9583fac1bac052938c19708d9df1ad
SHA2561cd99cc3ff8e716a54a85fa0636fdccfbb294475af744d60e8430b37afb95d28
SHA51258e15687e0597056e30487fdf5172ba830eeb3e88b235c350329db42e5298b925f4d36e8c0c74b698bea0df558b6797cc556034946614031d74dae6e1c9efb2f
-
Filesize
6KB
MD5cf3eb34f82fb353262cc3ffa41d9a422
SHA1d9751e04e636b58d5e98cb883ccb2ece10a6fc03
SHA256538d142757b762fcd7a268befdd3029466839a4df5b0477f402f37f168829fae
SHA51250f9b7ecce6450df19339e6413df7d128461db2279d82937748c80add8ff3e8e6b10ab592c9da20a5e69ba6e61353ac5606fb1ab2789a572c6095703a1bc2a3d
-
Filesize
6KB
MD5264fd2695ae7a9420520846b789324cd
SHA1b9d81148809ca5d9d4bc9357706b76815a8affff
SHA2561e371e9d3749f318665185fec1e955e3da6fc62a37c413ea5047133378df5c21
SHA512d387ce5efa64f75e6a2e8f3f41fc0bd9de4caa4eb7af5553cd2a12c670be80d6b4840ecd0c00f7bab0c91a72e159ad14e2bd43df28a8a347b937ed6ab7e845ea
-
Filesize
6KB
MD54a5de7b8095785ce1bdb6d5eba2042ab
SHA15c1090243a8383c766b2ee72e6167fd60d34a783
SHA2560eafc59ffb2eb678b4adc3b09e5ec8760add84ec868a5df96207343af0d75e24
SHA512148319e5423676370f2df7b976560089b900d35ecb7891e0e6200373af81ed212151794a16927692e2d2ab944f30c31b6621b432a709552cd8aea59e242b8428
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59e6cf5b22aacddd7edd57220fe9be21a
SHA11f89e61c96ef15655c4584b6cbaf851c82b873c9
SHA256c456e45337ec7c63e185b42f627271fc386ed6038a51eb9e10636136a902d7f3
SHA512ead1dd80c293667222012e1a077e1657532d4b5ff6b0ca0f171ac0aa578449799e1084d3a76a840ad66335e72532aa37f4b9933000a58ea94d1a79a1ebcc2743