Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 08:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://iolite.xyz/
Resource
win10v2004-20240802-en
General
-
Target
https://iolite.xyz/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 3972 msedge.exe 3972 msedge.exe 2056 identity_helper.exe 2056 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3816 3972 msedge.exe 83 PID 3972 wrote to memory of 3816 3972 msedge.exe 83 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 336 3972 msedge.exe 84 PID 3972 wrote to memory of 1528 3972 msedge.exe 85 PID 3972 wrote to memory of 1528 3972 msedge.exe 85 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86 PID 3972 wrote to memory of 3992 3972 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iolite.xyz/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe5f6046f8,0x7ffe5f604708,0x7ffe5f6047182⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2288325773752248618,7064515343657333638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5de87803394d4b5c0f69b66823ee427f5
SHA186406cac806f3ff216115fe4f8a8d0d088e45ac7
SHA25671106b234f5415db21a93df9c108ab9bca0392e42f1298dd5c1e56e1538ec0d7
SHA512eb58ae01109d1c1326b2dc96968eafa076be59d26a78966b1ef3d2ffc0b0a7018d2df6a13bdef030ec779671e1666576cd53a8acdac2fde657fd96f07788e1ee
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5d2bad1b2414de3783c4ffaa142a7f0d9
SHA10dc1f4c4d10479a642cc89ea895ec7ec9ffb915f
SHA256c6cc40500568fbfd8d91ebbb75183dd1190aee102dbb887ed703fed78769ae05
SHA5123cdb242ccee8cee323afc24a23c02896ee436f92c0947f648848dd332f67d938b694528c0ce34952e8732ccc68630e5688e77891fcca58ee7d0f86dac2c0b533
-
Filesize
6KB
MD5d62579bd2a6e5da3618ec1d3add96eef
SHA13657abf0169a26008c84962083078ac96a7e0474
SHA2568a6459361266a6aa53665ff891c04cb500dbb607ccca00cb111f3f5ae9843600
SHA512a59d13cd133b856fc84b6563d4ad2eacaba3fdcabf5d1b3f0de34708f9172dd0daa372105340c282439fd36877e7d80176b57f9fe3aeb0ccc5a0d357054d4e9b
-
Filesize
7KB
MD55370f8322c86f9911dd4732c9d7fdaeb
SHA19e4c3abd484a593d73f08b108183b4438620f8fb
SHA25634df652e5a9ad3fd580c72486b25d73413e9f25c1ffb9acc4fa0da6adba8cb7c
SHA512db438fefdc67468ecebd8ea23d00b3305b994c1f13965526ff2665420c219dea3856a409887154fa6db72a3502325d857ab569cc36f950176bb6ddb475603e09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5026133519200a0d9ef5d5777c8677913
SHA17bbf15a68dc0387e9a894ccb8ff6f81d5b5f124d
SHA256f67bd62e1cabd1bb49ffc5f9f0255bf4988448467a2351a54a8123f282421233
SHA51236e4a13a6c35fa8bb1c6f0eda16424a0f14d4bc6c1bf97618fe635d60b6842612e7dc021f068c9f672345b36f7e137d741214a88a497d6ed31272c78016d88bc