Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 03:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zsn.zycus.com/zsp/guest/genericRegister/NIS654
Resource
win10v2004-20240802-en
General
-
Target
https://zsn.zycus.com/zsp/guest/genericRegister/NIS654
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 4984 msedge.exe 4984 msedge.exe 2472 identity_helper.exe 2472 identity_helper.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3520 4984 msedge.exe 85 PID 4984 wrote to memory of 3520 4984 msedge.exe 85 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 4820 4984 msedge.exe 86 PID 4984 wrote to memory of 3972 4984 msedge.exe 87 PID 4984 wrote to memory of 3972 4984 msedge.exe 87 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88 PID 4984 wrote to memory of 2252 4984 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zsn.zycus.com/zsp/guest/genericRegister/NIS6541⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd101246f8,0x7ffd10124708,0x7ffd101247182⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9822423093823563002,979292453902331915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5bc7edcc6394049d34133f2cfcba9767e
SHA13a4edb8c4384141ff67ab28b30c3cdf24310b6ac
SHA25638987e79d105805784fffb9ce486f993c5f8ff323d21483a0e1782ce3f7e5f27
SHA512d8152582cc962f67048f7df84e7857698272e179b4221ffb8b70bf9fd445bc427f56862e43aa26eca6e0fd64cd525b810229b8d42ab479de10ecc391e97db52d
-
Filesize
285B
MD524018b85231331d6c64248fc04ea2870
SHA1fef788cda948d046998098f3a72e7d294e0314f7
SHA2564fce2891605457db0b7430acff36f961e4d4a2febbf9d93c4e70cc47aa67acd1
SHA5127671e83c75bc8b2476c05bb1b30744aded7ce4b9c663ad1654747916928b41a7b913db0a0eb91b6add234e53caaf0bee2ec48c07b9718121bf3e50b6ac4bb576
-
Filesize
5KB
MD5ebb462696181380588b1526c4ecf5fb7
SHA181621a4f96c1e1c06ef316c662ec9ad718d542e0
SHA256fbd6357385d506dc0b4a7e872fd59a339c2488101e8485bf87fae225f228bc45
SHA51239e8cc7800592150f6c594887dfa43aebf71a4aa33960e187496e38c4c7c9738ec5c8bbc7a4547945aba8d8af79d25f6ce1f63fe77eabf6538aea0c5413eebd8
-
Filesize
6KB
MD59c5c0e85247359b68238cc9d2f776bb6
SHA1e907b1bc6834a91dfbd5d72228499dc29216a2bf
SHA256ec503800d4da7dc71960d0089e6c93ea0578c3158e3ef6c2041380cb3e4da1d9
SHA5128fb1cd8b285764810cb391742bd85be0a5d1a789855fa58f0be22a7d7be1f352675d7b30346b2cda832e994fed65c206a9d3fe4187f2029aa47ac18058ed5873
-
Filesize
370B
MD55f519adcebad0b02f12e603045ed385e
SHA1605cd0763f654ac34855d1c6337316806a4a59c7
SHA256e11742e8a2d915fa5edba9449e3fee8e29d789059cf752cd1aa3397cc4612144
SHA5123bbd63cda34d132456f5ede40701623ab2d8b05dc9c5f671dc0cd23cc803df2092f87d5f3e3e242400026aef3fbe1b3353967f736be457f42cbc6f177dd0eb5f
-
Filesize
370B
MD57694c6d3ee255f65d3bf5d0aaed8169f
SHA1750337259eaf754f3e2b618d9a0b99dc25bd1fc6
SHA2563ffa65c4911d9a8b63ef8536f77a28746dc45661aa122a43d22750ba8747bd02
SHA512ea016a8d82d1db063576ddcaeba6401fd0ffd66677429206a419cc35e3c96c40506883a15bd5441c2b0bc8b810c8322db32484d6c127bcba708b74572e280de8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD541e06032e903f0d0bed6d7f533beaf8a
SHA10832fa8ff39ef1c7b043a676b34b5366f4391114
SHA256ec8bf4c4b82fadc284490db88859ddae0c92ead893f0a7c6359c2bdc8da23a1b
SHA5129ee37867278148055cc8e1e08d3b9c36fdfce302e68a8fe3d9ce144fe79c2e08ed37cce7d91a1729f92633e3da5c3d6ccfa6e750daab150947f5c1f3453f6fc2