Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 08:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w.mrapks.com/apps/obdeleven-vag-car-diagnostics-v0-88-0-pro/?download=links
Resource
win10v2004-20240802-en
General
-
Target
https://w.mrapks.com/apps/obdeleven-vag-car-diagnostics-v0-88-0-pro/?download=links
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 3164 msedge.exe 3164 msedge.exe 2716 identity_helper.exe 2716 identity_helper.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 5108 3164 msedge.exe 82 PID 3164 wrote to memory of 5108 3164 msedge.exe 82 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 2504 3164 msedge.exe 83 PID 3164 wrote to memory of 4220 3164 msedge.exe 84 PID 3164 wrote to memory of 4220 3164 msedge.exe 84 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85 PID 3164 wrote to memory of 264 3164 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://w.mrapks.com/apps/obdeleven-vag-car-diagnostics-v0-88-0-pro/?download=links1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfd4046f8,0x7ffbfd404708,0x7ffbfd4047182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2264 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6563416823584320804,5521863432853445291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD506e7b857186ce2b2e40e958369f4df3b
SHA1bd8f471d8b8ab097bc4c3cc6f090a6c2d243941f
SHA256eb6034eee2543946b5a6ee72d5ec1b2750eee1572e2f03a21c22ca3afc8e710a
SHA512eee62f8d1ab4832e2b989d82769d5f6601420e64d74eafe858ac16a786b55e320e64ea4b84f26473dbbc1b069bcadade50834e894d782522cfdebd05f242b9e1
-
Filesize
2KB
MD56fcd8b67542f9912bc3311046a9fc907
SHA1f4a771a52733db34e9f7ff7d213442c7b394d12c
SHA256470aeb1af374f0e24e7c6617bff0abac3cab1a201bd36448a6628e6cf8869ed5
SHA512f2fc6da9240ee49e1c0a019368d1669f4ef6676ab2bce6a2808d217245ea57a5ca68224409b3f26998fa872362232109bad48901124a4b8605426278ff23de1b
-
Filesize
5KB
MD5ea4ab48570da3ad66d8573737bbf022d
SHA124cdb5a4664abb2139c2c12b69f5f1f7f7767865
SHA2567dcaf35ae0f1dc880dc4e8b8a005f4213f2c269d68cd78374d9177c9e202488b
SHA5125535699556662d95384b8a5eb1f7f864a97c4a0ebaeebb53ecfe7293036a3c07e417607a721f1942a295dd295f420b843851daf50f7d853f4572fa897af22005
-
Filesize
7KB
MD5fcb9c200882fcf0f169e7e317697fc08
SHA1fd87350d452dc912b94552bc49c8a6b8f9b8553a
SHA256764c28936688dc6b76dcf6796c3c911076c7ad917aea3e27ccdf97f39465a89f
SHA512d001e13afda8acc0e3bc2b9d6ac7f73157074d7c79ed31b8958fff35229e572e0280a1960159df983392616184cb2c5a5a6953d2dadb27d93e31c3078034fb5f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5091ac51455ad4c63ebb2182aeae2928b
SHA1b77cb0bc605dc68243245f3fd224766024545d87
SHA256a33bd7b917ea5cd98c5ec4159cffb7be86c9b81513e72e26a81160f62cdb42db
SHA5123fdceb9d332f52fa45407de900c0d263148f0786ff5d5dec4b032c991389e7e39b8503df61727957afc62a6bc0ca5adad46252c4b64be0fd23cbedc183771deb