Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://37.187.22.211
Resource
win10v2004-20240802-en
General
-
Target
http://37.187.22.211
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 4860 msedge.exe 4860 msedge.exe 4380 identity_helper.exe 4380 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4216 4860 msedge.exe 84 PID 4860 wrote to memory of 4216 4860 msedge.exe 84 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 1952 4860 msedge.exe 85 PID 4860 wrote to memory of 3380 4860 msedge.exe 86 PID 4860 wrote to memory of 3380 4860 msedge.exe 86 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87 PID 4860 wrote to memory of 3352 4860 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://37.187.22.2111⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff99b1146f8,0x7ff99b114708,0x7ff99b1147182⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,237045068202309891,12279271546977376785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD570dd731c6247e084b595608a14781550
SHA1102e15fa5bc5c373a3b3e8525723f513b2d7f040
SHA25613ae3f3c493846897d79105ba0e9b85e90a0477b0cc46252a7ebba19fddbeef6
SHA512fd65ac7779d789bef32c14880d743086d50ef890c03f2485d9fc7f26f7b01176502d2b26d689691b9ec1abbf2e7da0ea54519ea3f5d498c58cbe8b369a738734
-
Filesize
6KB
MD58ac7ea7c41c2a75a3483778715534cc6
SHA14a2ac9292d40d9690ddcd68bc006eadff5ec8ad8
SHA2564880d031c0996668b3fa24dbad45120418d4dcb1f2d91d77b734baf090937857
SHA512b4458e93eb874af7c924e22f0f0fd7c00061ca36fc76da03ee5c4b8e8535cbf348c2ef79fd684b04d7643623d57bba7d95c606f2cacf1342dd5842533eb8cca9
-
Filesize
6KB
MD57ff8e8b53d7ec971c67a5b8769a8e351
SHA1d2854799f1d1c3b86effc5d6a66c1e32b126bce5
SHA256ce21498ac57c87a5cee10831a0246d78a5631b541a35c4082e7337b84402a53d
SHA512bfaeaf650fde390f3fce2512b493a03b306d46582d3693958272fd9db70e31c0848f0836dbc1a99db33aa8e000ee1aaa5c01ea07449f784fc2b6f4dd55d465d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e2f59ac5872f3b5b2ef2d02cf2dd5ba2
SHA17a23a304d9d69ef30e6758124c8e067c5a54d906
SHA256d3ed0496da6c8c09ac450d79600c77424317436445ab6d3c465351e449fbbca0
SHA51254739fa80f7bf7dc1f8f2cdc27645abfd44aa7822b55cf696cc6b3f900133004338db0c62eb957a32906ae9f97db4f011f3125ea0d7ab880b4066f1fc3186b8a