Analysis
-
max time kernel
4s -
max time network
5s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/10/2024, 12:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipvertnet.com
Resource
win11-20241007-en
General
-
Target
https://ipvertnet.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2036 2160 msedge.exe 77 PID 2160 wrote to memory of 2036 2160 msedge.exe 77 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 4636 2160 msedge.exe 78 PID 2160 wrote to memory of 2168 2160 msedge.exe 79 PID 2160 wrote to memory of 2168 2160 msedge.exe 79 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80 PID 2160 wrote to memory of 3196 2160 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ipvertnet.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff67a93cb8,0x7fff67a93cc8,0x7fff67a93cd82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,12892075368530827150,16389521115061417881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
Filesize
5KB
MD5f6717734b1fc4697ff07f6f66200a185
SHA109e6ce168008f1e1fd056a80866b1ae72caf7b85
SHA256931a75c7ffa9bdae54534e792bc9b0616c8b7bb356794290be4ca748d3f78037
SHA5127b542a10b841d4d1a0a2fd47077718f3736d16fbf01a21ae47b33ae5fcf51c97d05916260cc81da17d2e77472ea5908ae2ce546113adb69ceeeddf456e1c23d2