Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:03
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://darlin-mama.com/xmiclog/309955c5d6c28d7ae71b4bc85d6e4368f1093ad9/[email protected]
Resource
win10v2004-20240802-en
General
-
Target
https://darlin-mama.com/xmiclog/309955c5d6c28d7ae71b4bc85d6e4368f1093ad9/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 3132 msedge.exe 3132 msedge.exe 3288 identity_helper.exe 3288 identity_helper.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 4880 3132 msedge.exe 82 PID 3132 wrote to memory of 4880 3132 msedge.exe 82 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 4792 3132 msedge.exe 83 PID 3132 wrote to memory of 1400 3132 msedge.exe 84 PID 3132 wrote to memory of 1400 3132 msedge.exe 84 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85 PID 3132 wrote to memory of 1452 3132 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://darlin-mama.com/xmiclog/309955c5d6c28d7ae71b4bc85d6e4368f1093ad9/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd83a46f8,0x7ffcd83a4708,0x7ffcd83a47182⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1280 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7864226818294088756,11805046063883553768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5cb493b761b74884b00877d496f5f4772
SHA1773c7304b793eaa338a9d81aa278603c37557b8f
SHA25611292311c1534c6ff6ccfebf86b72397884e29f8b2188d30792fd124b1766400
SHA51284577d0607048ef5d1d45eca6b155ceffe3694612e4c91fd838cba7bec9a3b1a27a42231f659d448a7627a07d8982da9d4d45bf60598268e748f530fd181000e
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5687a5705659ae3ae7c020ed0bd409288
SHA11955df5d06ced3c6af53d2ba4b86c08c671b56d2
SHA256af3d742eddec54fc760cc882beb2ec76fbfc85a0c7f285ff9c737eee1c34fda7
SHA51298c751d80711262827c80d000ec391241302e5b8b1be9d218198402eda302d2f6e357c22c7caef9136c1fc3eee801b18821e0b8b83b878e676bfc8ce034a8d96
-
Filesize
1KB
MD544b61ad381174c1ada57a395f1a76975
SHA172184a8f3d10d50627f2ad3d10606fda9c40804f
SHA256a2736ad4cfa01af353d9d4df2a52ecac439bd5fad28e6dac1c31190ed62c79ff
SHA51215a515ab7d1bb09a11674a02addd1da5392285096cb3bc00af47fd8b33a8473f448575bad1c470eb19ddf36ca75764af522e2b100ffcf8120158c7f0c94afd6a
-
Filesize
7KB
MD51000a7d94eb84730717e6c4a92a64928
SHA11d9018677e2e78a3a1ffaedc52ae26fb21fe2a61
SHA256ccaada5a06e3cff687731e381564e428d8a390ea5fa6d0db91a1d07b72cb08de
SHA512c0a1709d20e644ddedef1d86bc5dcfd4d579abea7a966217746448503dfee9e13f08ae263e4575f4652d562068f647ad01ec171c80de67a7acfa60818c1b77e8
-
Filesize
5KB
MD5fc9b93f8af1c0e595dc707a17356f2eb
SHA16b705a79533af0d18eb61cb9c5642c06b976619a
SHA256397d95c0bc90daebacd1d5e725e01a26ad48fdd520be83643066b47f53201991
SHA5125d066c16cc69c71410f0b46eb816afd0383a726d48e3ed83c3f4cc6e9d2670c416d175d76f08446321a77bb23743629171553132f80eae1e21b7390ac53e1502
-
Filesize
6KB
MD5633e76e28a4f1908bd9808d493194455
SHA12a68d0cc5dc2f682ef16a4c676fb01cc9d2d6c0c
SHA25686eeba5a25596f22da0af5a81a77d992717f9e4dfaaf802bcf9e875e2e0798d2
SHA5125879409d77a1743e4496eb58dd156bcaf69bab90589768cd9ca62f46ab530551f6343d54a4953a3dee1e91bda4a85b88d9d0282ad177ad36177c65b1c7f8c3f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389