Analysis
-
max time kernel
325s -
max time network
326s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 17:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipinfo.io/AS32787
Resource
win10v2004-20240802-en
General
-
Target
https://ipinfo.io/AS32787
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 7 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 4708 msedge.exe 4708 msedge.exe 4232 identity_helper.exe 4232 identity_helper.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 920 4708 msedge.exe 83 PID 4708 wrote to memory of 920 4708 msedge.exe 83 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 3092 4708 msedge.exe 84 PID 4708 wrote to memory of 2932 4708 msedge.exe 85 PID 4708 wrote to memory of 2932 4708 msedge.exe 85 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86 PID 4708 wrote to memory of 1152 4708 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ipinfo.io/AS327871⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb974046f8,0x7ffb97404708,0x7ffb974047182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8551654846106350594,14075253226388698477,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5079b670fea919f21dbfc1de1fcb88cf3
SHA1e7a6d605fb0afd6abdae02dad89d07676d152b4f
SHA2561bf4477acecb37f85754ecddbcec1e8c2b7f0274f6969bd3df1c4a011790c92d
SHA512c18fe1820b367332901f235b78cd3b0c4aa7cf0837450dc21b2c9b9aa9a02ede2a516751acc6a39e95fe38e4d107e26077c38db55a4b818eac896332149e738f
-
Filesize
4KB
MD519dde7097bf08652ad436c4ead42ef86
SHA18e108bb42445c006789cf1b99130f5677c3077a9
SHA256860a7573bf7002290a385bc7b4518e3bfd5246aa9bcc45e5e3b3021f6529c850
SHA51226afcedd5fe0eef4fa7e9ee362d2a18534af153148f4255376867e3595392de1a24c920478f840833eac3d75a2127d5bafe01f3392e2d8ede9380ee103d4c913
-
Filesize
5KB
MD5d66b777a4ddf284776910f3c689ac97b
SHA1a118573904208e39d758ff8b16c32d3e86c99a4e
SHA256c178ff309a700e725085789ca5401578e7244b2191b5dbb47e9d37b600e06ea4
SHA512f1ca75f4a313b5353bcc3516cd02eaa8301eaabe160131cf6d1b8bfad91896895f3253c66d1cb4e405dd37f8e8e0c132bf2dca9fe64c83eb950e921da9b8c0a5
-
Filesize
8KB
MD53fb3edfbae4694106837c1484769a688
SHA1306c6b8d6360c6570b4bcf0befcec7ae3f903016
SHA256cbb14a96849d5dd05e2d1c8dd4ab96e3fe2c9ca2f484c00a0e57c81c85dc1477
SHA5128d4c9f32da25264c23c4fa5f748b9a9e38ce589721dfaf0f431b08c3affea619d74308eb0d51254e337162be5603301cf4b097ae7801db68ecb077245907ddf0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5951868140df5f79fec400c0ce2d3fe65
SHA1f367bba8d376620263ce3d3a49390f6e95db2bc4
SHA2565a6956ff74a97bab1f6ac4cf7a2fbff6bbcc6b43a896f3a3594b024c2babd59e
SHA512719cb45175f89570457eb1a7a1aa670ec04c1d73b94a3407bdc4f651a953f7e58bdb0114a82d35f1c9782b3b7121a2b07b36c4a3aaaf07500237d2b29889be6c