Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
BlowSXT/Blow/Blow.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
BlowSXT/Blow/Blow.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BlowSXT/misc.vbs
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
BlowSXT/misc.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BlowSXT/rBot.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
BlowSXT/rBot.html
Resource
win10v2004-20240802-en
General
-
Target
BlowSXT/Blow/Blow.html
-
Size
1KB
-
MD5
a10c97e037dda9e75c0ae3400750f2ea
-
SHA1
3c7e63c2e4c2ee470804f3539708302a5f3abde2
-
SHA256
0c836daef4a1b96db0f3d113bb033400930ed310c3d0869a3857b9ab39639abf
-
SHA512
64f97a5e24561eafaa1811d3ee282ad5891d504987c4422c479967ec34896409e0b7531a971d001a31f693581368dbf62ca7364dcd754c5a34c9a7283d2ad887
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2240 msedge.exe 2240 msedge.exe 2264 identity_helper.exe 2264 identity_helper.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3232 2240 msedge.exe 84 PID 2240 wrote to memory of 3232 2240 msedge.exe 84 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 5080 2240 msedge.exe 85 PID 2240 wrote to memory of 2532 2240 msedge.exe 86 PID 2240 wrote to memory of 2532 2240 msedge.exe 86 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87 PID 2240 wrote to memory of 208 2240 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\BlowSXT\Blow\Blow.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebbe046f8,0x7ffebbe04708,0x7ffebbe047182⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16753707344207613019,1978821894788603677,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD54d8c2645b37ae6c2c293de97d1722c51
SHA1f7d1f1ff8c19e16c467fe4ae1fb5908d5e599710
SHA256859d8a41ac9287cdce01100bf4443ec8882d41cad1bee530e851e6f1c65d12d7
SHA512bb4e327bb52e9085e890186ed195737c80827804e55d64fec0476bc32d9333efa662e137231263b5e2dec19ff5a22282a44740554afa74a22d798dc4127aef0a
-
Filesize
6KB
MD51193516d394d0c527c729c40a24c7dc9
SHA17aff9179f318b2067a0b5cd5d9bc0db050f8493d
SHA256e0f6387ecb5e471119b6eb18e379e1d418f12058590219cc49fe82754851131f
SHA512665355f17de223827e8326d8f783f1da72561b9e9220da6459b42994ec9ad84a9a705f7dd316f164bd65ffccedc8ba5c1e7db91ad19908c72940b6c3ed30cffb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5777896226aaff0c609ff424f2bac157b
SHA1c1a7a035729e64c15a66973676e2bd7daa7c861b
SHA256b51361b9e2315fc82a493bd19d6f3987c840676762225aa58d7fa079cf007f96
SHA5120aa1ef4987af9f847e91364de75479667d5c57a862ccbf6d9c96f12fbc6b9d0e1a5c3f29cbed5713cd18a84a75035d96b7d576875495f2a0baa0d4ee6f898fd8