Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 07:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.api.soget.it
Resource
win10v2004-20240802-en
General
-
Target
http://www.api.soget.it
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 1644 msedge.exe 1644 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3992 1644 msedge.exe 84 PID 1644 wrote to memory of 3992 1644 msedge.exe 84 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 264 1644 msedge.exe 85 PID 1644 wrote to memory of 4488 1644 msedge.exe 86 PID 1644 wrote to memory of 4488 1644 msedge.exe 86 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87 PID 1644 wrote to memory of 3636 1644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.api.soget.it1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94f546f8,0x7ffa94f54708,0x7ffa94f547182⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1713824991969125451,3285836993054999478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD582fd5e5a831e5c21be576b34b667307b
SHA125b526b3e9630a7dee2e6405384285c4883a3799
SHA2563696bd7e7cf0267468c35279d8b1157280b4c4a750316eaf9102938f6fa10bb5
SHA51212f05cc60fbb0e5df9875ce3c8fb3f5dd04954bc8114f9b1bef7037b36834ee2b03ecc1bddd0a7e243b25996fb95de8a3ff5055e0e19f7d1186a9816cd4cb0cc
-
Filesize
1KB
MD568c67b462e971b9243b22b0c72acc55e
SHA18af2ed1b8fb501ceb24b4bee953939bb37b14bfe
SHA256bac1888438de06273856b780a11cf914daa47b233884fb1dbc9b6ea3c29a48c3
SHA5124ad28ecafa8a826fe98b1b36b1a5c02b085e48efbeb17cb8fe812ba973f5b147b213e3f877e8a4ac0dd94bd766aebe1d48b75b25bf0f1592d88bbbef8d406d27
-
Filesize
6KB
MD51418f43650e3312e349a3e69b117dc0f
SHA1c1126a63dbb54e429173ed0a8387c8d9625ab084
SHA256d83b1f34d74b839ceca47799d411cead9910532e090f17e78d0f140f1d989d37
SHA5120dc2ff1186e06e47dcc91a3dc87f70969cf7187207667b706bfd2eb8935833b2b246ae97aa3446e0b9605c92027ff13b0713262749d8a26a536531f61d119169
-
Filesize
5KB
MD585cfaeacdddeb2d34712a3c9ec51a40c
SHA118ac3ba8ba2fec46790a2b021d91cc57da38d368
SHA256fdfa6d08185fa5200d13b152b95cfb74b32ad43402e36575bd0891b46b70d307
SHA512483500125789358f27ebbe032151c4c3268479131cf2d48734191e4c47060d76b10f68e4547588d386caf05057915f4b8517d6ff3afa1cbd0c57825636c832fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD594ef53ed17de8d134b5d41c955cd61f1
SHA1cbd3bddc9f83d7d342c82d19991116fa461c9634
SHA256a98a8079537e40597913c41e0b7c90562d981e874a781ac46824bdcf99d3845f
SHA512ef9827161505e222e57d9ea7638e4b90d1abbff8272b9fbcaa914e563202f433fc5f1811ddd9118bc45d3f6cf3a8184902d06b3d1237cd925b8b3ef02bc5a3c9