Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 13:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ikarussecurity.com/en/private-customers/download-test-viruses-for-free/
Resource
win10v2004-20240802-en
General
-
Target
https://www.ikarussecurity.com/en/private-customers/download-test-viruses-for-free/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 744 msedge.exe 744 msedge.exe 1176 identity_helper.exe 1176 identity_helper.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3672 7zG.exe Token: 35 3672 7zG.exe Token: SeSecurityPrivilege 3672 7zG.exe Token: SeSecurityPrivilege 3672 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 3672 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 2288 744 msedge.exe 84 PID 744 wrote to memory of 2288 744 msedge.exe 84 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 3228 744 msedge.exe 85 PID 744 wrote to memory of 1504 744 msedge.exe 86 PID 744 wrote to memory of 1504 744 msedge.exe 86 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87 PID 744 wrote to memory of 2608 744 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.ikarussecurity.com/en/private-customers/download-test-viruses-for-free/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90a0446f8,0x7ff90a044708,0x7ff90a0447182⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13481913785463533314,11701851036938937393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5340
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\eicar_com\" -an -ai#7zMap23982:92:7zEvent106141⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD53bebdcec958e350370908c49505a97f5
SHA13948e9170d7ac4fad14bb820c87fd045beb1bae9
SHA2565b9a0d2a686e3bcaa09a64553fb1123bd271fd5abb01d9785a9b176a00a37b67
SHA512b4f2810849a38245ea1def7cbca133933b06283ba116e263ba9e1b980b28162f3705828192b69348f3dd3fed97a23a2769d30e54c697bab63070598fea6f3d0a
-
Filesize
190B
MD5640e440a7287d0a84cf099672f5d3ffa
SHA13f8e537feb34d983da997e61546f3733970a3c0b
SHA256ac1b503c89bcebf5da83d0d2edab10ac82128768193633b19977202eb8610bba
SHA5125de743a0a9e04513499048ed79044dca7f3c50318ecfc3f5b8f0cec69abca21267acaaa2c7f040d6e6f29cb835bfe79a82ca9e7d9b8ec7a610ce78ff59424c98
-
Filesize
6KB
MD51d51fa097ba3f8b430df645c0b0e5daf
SHA1e9a76ef10394e36b4a8eea89f33e5cdb69f2921e
SHA256896c79acd8b29a2fc1d05d7496f9f99fd156b756e88542e78f42abdf87083bb4
SHA5123c1ee7e8b70434d8a9819c60ad51db378b6f0c9d66b4f2cdf5f75c7e3b1a4cf5f312f0fdbdb6d2e13631bfa0561d192c0d7624358553ecc19bdad22ab074062f
-
Filesize
6KB
MD561061bc463bb564ec6a178b233c8926b
SHA18c5551a543a1693f95bef2475fed0f22432bff1e
SHA25641d64ce2daca8b3542f3014778afbca483edb641d3b94f598f85b7df4189d5eb
SHA512e4eb8574eeb797caec83e8cbbc6871131a54892a3db5877082768873ba06bc24716d9e9ca0e76f2a3d549e444a2f3a16a148267e09963851959e5d2a7aabca8f
-
Filesize
6KB
MD50504f194b9273f9d29ffdf268d24caa4
SHA1739db2da0a8d35eb9e5ea6ebbb68903d5be49ec7
SHA256323cb9272951a26c74882eb9cb84fb23e168fe1660999b6171aa9539b14b0c84
SHA5120a67f493878c2dd962a51b1f6cffa7cca688f046456b1c01f2efc897f0fcd628ab23e31231b5739f94405942003be2f4c50ffacd105c8cef2e9918eb42d7b6c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55a852b0c94ce65c818fa1c553290ffa1
SHA1755673af972cb7a38992f630434f66d6e464bdb1
SHA2567cffb87daa54889bd0944f9b768fd01659d2d8d76963761fccbe45f6e11b10bc
SHA5122a3b304e2292f07c5f6812872c01fb02de4b91474936c02f965c97c95720148376307500149876ed3d2f036a9195c2115aa50fdd3cf97eafacf3a4e41cfb0aa9
-
Filesize
11KB
MD5474b108f16ebc9e18e07f1c93408681d
SHA1fbf57f3fdd520e3ddfa7f49b313e144a548bcc77
SHA256529250322f10d52e3cc6b3a123fa7990c1b3f9681c69bb0a9fb41acf058de02f
SHA5129785f4aea7b58bab1c6ab95fe83348b3674b0465b88db13accbe6e59fce24463f0a9e14d7637cd1c511f03675ca0d6dd8399dc2b9f9aa55d27bb843b1d977293
-
Filesize
184B
MD56ce6f415d8475545be5ba114f208b0ff
SHA1d27265074c9eac2e2122ed69294dbc4d7cce9141
SHA2562546dcffc5ad854d4ddc64fbf056871cd5a00f2471cb7a5bfd4ac23b6e9eedad
SHA512d9305862fe0bf552718d19db43075d88cffd768974627db60fa1a90a8d45563e035a6449663b8f66aac53791d77f37dbb5035159aa08e69fc473972022f80010