Resubmissions
21/09/2024, 09:53
240921-lw3phawdmc 823/08/2024, 10:06
240823-l5bmdaxglc 1014/08/2024, 07:34
240814-jeg1csvejp 10Analysis
-
max time kernel
36s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:06
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://budastoor.emlnk.com/lt.php?x=3TxtmrUFUqPUT55qA3P3VOFy2H6nvd-hje0yk8Q7UqOe5HV~zd5LghWd3H6nkNJfx1wwbHQWIYGa#[email protected]
Resource
win10v2004-20240802-en
General
-
Target
https://budastoor.emlnk.com/lt.php?x=3TxtmrUFUqPUT55qA3P3VOFy2H6nvd-hje0yk8Q7UqOe5HV~zd5LghWd3H6nkNJfx1wwbHQWIYGa#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 316 msedge.exe 316 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 4492 316 msedge.exe 84 PID 316 wrote to memory of 4492 316 msedge.exe 84 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1476 316 msedge.exe 85 PID 316 wrote to memory of 1560 316 msedge.exe 86 PID 316 wrote to memory of 1560 316 msedge.exe 86 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87 PID 316 wrote to memory of 5048 316 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://budastoor.emlnk.com/lt.php?x=3TxtmrUFUqPUT55qA3P3VOFy2H6nvd-hje0yk8Q7UqOe5HV~zd5LghWd3H6nkNJfx1wwbHQWIYGa#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc196c46f8,0x7ffc196c4708,0x7ffc196c47182⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13666222183213141422,500069534199795991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD55d4db8ff1715b9114d9f6af78ca8ba63
SHA19b8bf3c62791d3ecd71d2802f92328a45000efaa
SHA256f212d4810a085ea4e0dc987b9285ab5d5f44de74d9fb96e23e6e61b75c2c7b84
SHA512000c8f1c0435a8a2e96df13a806c9945947d4d1d4381f80beaaf7303974734021d3e878adfaa4d5a469d20ded3ee4df1ce4dfdaeab8c77a0b1ac78bace704d56
-
Filesize
5KB
MD59e2cf4ec2605377ca81c28b68bd1003a
SHA1f6ace2adfe77415a2a524f053319439486d60025
SHA256039521bb39399f7241f9d50ada7c0e64041c454d705d15aa202d55e0ef7e412d
SHA512a8b64f2f74a448575b9c7c2a3d94073c583c39bff5057f416fc1b053598d295af3542d754a5f9a9ee7c28d2adc0ee278342f15c7b1d0b147b7d48e78e0a06c36
-
Filesize
1KB
MD5925cde9165c1aed7bdb5839b6e670d30
SHA15093a6ca69cea4413a494115da216beb09a533c6
SHA256806f782c96e1db38d82b8f98b319ccf484bd61d8afeee2cef9d56bc63f14d834
SHA5125e9c4b0617279f30f41ad35b6355e874c2d6245f4491cae21ce5294086d1ae399860a80893193ebf9e915a44694fd6fa566b3c16eeccb965fa6d2856459e703b
-
Filesize
1KB
MD5e1717c08586755b9daf239ac8b224d30
SHA1aaf65cbd47986424a954e0962b76ecd5ae641d1a
SHA256afdbe822570742229ab0ba7f5da6fc93661ca366b21f2e17ce208081d4b53404
SHA5124dba4864249f8658a7828ddb7b1feaddaccbc2c3b76dd8306276aae5df78c7aed873825b7f42903953a489cfb7b200c5696089fa22b2e2b649ad6be1e8d900ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ad1722a6-6013-4931-b4df-e9ddda2fbe24.tmp
Filesize6KB
MD582610be9a40bd25595340a472915a7bf
SHA1f851df68c2b003f118c648042f39a0454b48d1ce
SHA25621babb875e7dee557ae1e4059bf3e4acf8bfeabda8c63ac538b2b688b8cb4c42
SHA5123a72dacdb3853c5afd7bd21e97ed36ce0413146ffaf8448e64bfc237b7c266faedef4eeaf936d8f78d3c6830d4d4d505320536111c1273e8e1e786be7a0f2658
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5474c4b777e9bbe3912d9350c8505ce87
SHA11f5118f3d5338b8c82111240abcbc245d0585a93
SHA2566ae753bf918283c12ae1167699754e3b041c27cb186dd67a590f36cb82d364c7
SHA512dda4bce955b858770ae05c63cdd676ded7cd600d2794ef5afa7f62fea765ed113b482e9f605ada77d0fe50a814c9334d598de4b95fbe2879d60d14f7aef98df3