Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 11:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://213.174.132.114/6f0e60700188e3fce110502eb6997a311a0bc060aa16ba4829e74219b0d06150/w
Resource
win10v2004-20240802-en
General
-
Target
http://213.174.132.114/6f0e60700188e3fce110502eb6997a311a0bc060aa16ba4829e74219b0d06150/w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 1616 msedge.exe 1616 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1388 1616 msedge.exe 83 PID 1616 wrote to memory of 1388 1616 msedge.exe 83 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 1720 1616 msedge.exe 84 PID 1616 wrote to memory of 5116 1616 msedge.exe 85 PID 1616 wrote to memory of 5116 1616 msedge.exe 85 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86 PID 1616 wrote to memory of 1300 1616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://213.174.132.114/6f0e60700188e3fce110502eb6997a311a0bc060aa16ba4829e74219b0d06150/w1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8d0f46f8,0x7ffa8d0f4708,0x7ffa8d0f47182⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,8888150387943571702,1311546094467143275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56837505dae817f02bbb549d3910f76ec
SHA14bead1243a3ed4ba876f30031d11b7fcd4052b84
SHA256997f7c6bb1805cb785d5c0ce131c8cb2362e6dc77efb38c3980f69b7a789a649
SHA5124382a76e27e70b6ecc05c14e9a1b915e36ca661cb868042b28d59a7d807ae1ba069aa0e734648225dee2b6dc33626f58ee24df1cc451217fa093f46d5df616d4
-
Filesize
152B
MD5e15f9acde9d56006be268b4025f94b5b
SHA15d36b646b34f0a1d08b6020f12e548db96865906
SHA256045480199f3befc5d2eee18f84e92cc5bf8881b76ac168085a987878da798e0c
SHA51222d43f812391c9fafde0a4e247212e491765e8f049eb56d692f248623b7a52044ceab8e6977675c343d502b460666bd72a4ea970f9aaa7a6b8a6c3a880bcc255
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD51dfb8de0ccf6a4f5149f8c95e9cdd727
SHA1c72c6b75c0d81823f228dc66c38a3955ea7c920f
SHA256b45c2b4bb026e2d5109dc6499c6764f960bc2e6ac6e123914f2eba402e256103
SHA512462ed712fb3a97b971d3f4b1b4568df1ea8d4d357cdd2c3d307b988f53401e398d2e3dec55ba34289836864a81fd6942797a94803b76b36741e53154868e5409
-
Filesize
1KB
MD56d70b0cfdcc876e36e338f0263c00e15
SHA1fbb7e20481761e505bc817b99350d5e371d3adc3
SHA25693f1401824ea5668561104ba9c5356d74baa23ee8b6d6a2b6632387145ca637f
SHA512684b6b7554c790b46409c0d7248481c94de260a756e2c24f3017bd7adccf877f1896e43db193da5e9906621e3aa7e667ce2f1bd9c0aaf36fa45bec4a89d0d976
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD52fb654244b39721562c84ac62f0c7825
SHA13b30f15470623ed48cb3e0117ef0e624c4a18afd
SHA2563c1ead9f001ceae0533cc3816da8e26a7342c43b0858c52b0a73474d5d55268b
SHA512fc132bb4d2982fe636ddcf3a35720ba08dfe072c79b2db7b1ca8304fba3b68d856d52a13a377c8a526155c0270003e5a683c0d0ca510c49fdd9fd1d8b8d96d52
-
Filesize
6KB
MD502efcf8158fdc3534c0a05442716bc2c
SHA1c1294da07d52b56082d2ff3135186f48c92bc8aa
SHA2568dc277fd6d1013ce0167f48bb6649d56fe7b3e020f8ff8d4f1ca80b1fe6deab0
SHA51279a36c541a4a7e6c4ee885d5ccbe595b3842314e1f01e2863e8e7cdd7d46d901b477804d9b1f60e0bf1d42412f936e8eef7ec413a3f6967eeff7edde4f3c0850
-
Filesize
24KB
MD5e311e8070a5db17b6cab425cdb01bd27
SHA1ac533db7fa0902f34d02662fd029facbf4b8e8c6
SHA256b9aaa4c71488c3a8769cee7cf502ab93813fd6df60ff2172ba8cb7e1dec86532
SHA51287accdca84a2b2042e2c12381cd1bc0fb2d74bbb0c6a4d18f444212803ebc0b7184317df7f5fb3eac722d5d43d942dd62ee1d760f0b3fd18911df5bd04fa31c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580d7b72cfc45aebaa9cb4d4c1ee4d6ac
SHA1f751ef1a7fbaf0a165163ce68306db90cbeb17b2
SHA256bc40ce2465853e15dec1b2b97322234dcd4233649a983f0efa085ebb4aa54ffb
SHA51271324dbbdbb0151ecfdbf9168622e751e136c217fccffe2cb892608b7e117e39ef08a7744f0b46be17ade85fba00deb824a30f5da605f8ed5a3199f8094432fe