Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 16:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://github.com/moon24-s/NOTEPAD-12-LEAKED-MALWARE/
Resource
win10v2004-20240802-en
General
-
Target
http://github.com/moon24-s/NOTEPAD-12-LEAKED-MALWARE/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1356 msedge.exe 1356 msedge.exe 460 identity_helper.exe 460 identity_helper.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2052 1356 msedge.exe 84 PID 1356 wrote to memory of 2052 1356 msedge.exe 84 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 724 1356 msedge.exe 85 PID 1356 wrote to memory of 1008 1356 msedge.exe 86 PID 1356 wrote to memory of 1008 1356 msedge.exe 86 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87 PID 1356 wrote to memory of 1416 1356 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://github.com/moon24-s/NOTEPAD-12-LEAKED-MALWARE/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc66846f8,0x7ffdc6684708,0x7ffdc66847182⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11238518828638476275,16603605246130671260,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD59d666dcce57aeac4bad87eee0530ce38
SHA1d223a9d76d72f17a2eb1b9d1a5e4e4579b25c0a6
SHA256ec4c2b909e79cb3253a7d751ad1e05641d3448767005ecfdf0d1b1f8019a63c4
SHA51220bb17d9562d3755407ae56f115c1873b05ec7d8ad06fa985606d223afb0a4cf14f6fc37d8519a3cf0d5a115a4e170bf8c03c4a2bf58bc12981c69dc5a8a9193
-
Filesize
496B
MD5406d40f57c41b87d19b999ebfe5296fc
SHA17d6ce47afbb25a87565cebdaf0a1a2f4af4bfc10
SHA2560d179bd1f38ad65839441984c85dac651e393eb75c561885911cb8cce8be6974
SHA512a763d98c4e196a8f81244761848a52ab25cf2b4dcc91ff8a977828a7f3639f05248463828221b575942a4c99dc5b720703339e4cb59e11a301fefa6236e660fa
-
Filesize
5KB
MD513e8a11cbff8228bce0c26417d32dc50
SHA15bc8155b2fe8fef98dceb65e86ad4514c20b3003
SHA256726dbeca595b9f24c4dfd48fd30707d4618e20d8ce74efd05328d600b61c225c
SHA512309af4582d740bb76350e47135e613ff8785ab4881873f285dbc9e72ae84cdf9caab4c244bfeb0a56e8eea421363b6f79cbe5624e8a1e2c6c988a0e2524b6582
-
Filesize
6KB
MD54410aa100346792226a2ec5189362ef9
SHA12e3717b5cf2ea0da0e3b45b20abcb2ca9eb7b02b
SHA2564992b195798a1fdad8d49ed38d03b127668366b0e80ede24a872ae71b6e27a68
SHA5127d8a9495022df2bb3fcaa1a65f666411dff0d8901f1e72b5a22eb39e17bf81270ffcb104ba175bd24f2b217b2095b6f8cece99108a38ab66115abcf075345c09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56c0610906a4468b45029145359b69689
SHA16994a321f4801913b96dbff21c68514312b232dc
SHA2566a34a22fe7e81a840bb26c193cbc2e9a3d0458897a26249f3ff71993d0a1a60e
SHA51235f278f573c7a33daaa0fd65bd66c01887c62ec4e24a48c639179989ff9c2226617f0d779761efb86a5ad7cac21f195902d058f2fb7c420be1195a089b3ec328