Resubmissions
03/12/2024, 21:44
241203-1lfvba1ncp 619/10/2024, 22:38
241019-2kv4aavgnm 319/08/2024, 01:19
240819-bpr93szapm 319/08/2024, 00:51
240819-a7mlwavcqg 1019/08/2024, 00:48
240819-a5824avcka 619/08/2024, 00:44
240819-a3nndavara 1019/08/2024, 00:41
240819-a12gfsvaja 719/08/2024, 00:39
240819-azr7dsthlh 819/08/2024, 00:02
240819-abjkcasema 619/08/2024, 00:00
240819-aas3dswaqk 1Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 22:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 2936 msedge.exe 2936 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3988 2936 msedge.exe 84 PID 2936 wrote to memory of 3988 2936 msedge.exe 84 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 716 2936 msedge.exe 85 PID 2936 wrote to memory of 1148 2936 msedge.exe 86 PID 2936 wrote to memory of 1148 2936 msedge.exe 86 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87 PID 2936 wrote to memory of 3584 2936 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd647182⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8814219864341187068,13960482700625562848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56befb629d7451d60fa4770cf1fa14145
SHA103b386aabfc3db80d30b1f6ebdbfb76ff93aa034
SHA2564cb6331c020cc2a7fa99401f0284e62cb60f054be43279b04cc41870923cd7e0
SHA512008123829dd81f3208d115a08c819c3ff05d106f75dac6d80f6d1e2d1cf666667e149aa4e7fae60a763e840e6bcce28a12e7d9cf770a363574d4c3e9ee898670
-
Filesize
496B
MD5aadae93b8d636d034aee972c3635d7b5
SHA1d8c1119ed585b5403056f37515b98d32d3275ab9
SHA256baf498aa585a836559bfdfeba511aa8392d8fac7d57e594062dbad9bbd5c8327
SHA5120a27888dc32f54cf0f1dff75e1f38813c60a0e0d04c16eb2f0a6bd898455f31f0008aa550b1e36f342527d777e71d9ef3e7e88788366f6b64cfdf8ece6e7bd81
-
Filesize
6KB
MD5d8b0a211d5efee63647937230f9128c0
SHA1f7fa4d996bd43b303cede956d539a6575386ace3
SHA25676571295b6431ce75c581870649d0c2e7bba2efa611d705c2e171d798317aae7
SHA51206fcb2dd980dbdcd50efc7a37f64e83f2f1f4432faa4f59d97f8446e0cf4c93ea6084ed9c040b2bcef8be271834bf635bf62c3a2f994d7e19416e70626f1a692
-
Filesize
5KB
MD5f33104eda9c2a0aefdd3eba0a7069aeb
SHA1f26ac0d3532d873aeabba572b61a6552520d0747
SHA256b5577861d8a3bf81f9c60397246a78747104503ee0be7048cf3408c16dc675ee
SHA512f9172c98ef52e44903cd043f7546a3009b1193a9de4194329b9f7206348f8dce323831b78ded13f608f894b9c6863f3f036ebcd16cd2654db59f4d7034d26341
-
Filesize
1KB
MD54d0e409d9541ff4be32c4f21e8913368
SHA1a766a13ed33a3ad63465faa5d11477bf59341bf8
SHA256e588451a855ab7acba95ef56ab1a41f3e54a708361f06e1a02c9f1040f5ee399
SHA512504bec7105bbd02edbe78733a6c5aafb915e27e938860b53f9dbdc05012a00b9cfdf92f316c9810dd41c4c3ec91c6da46eb3882bdecafb1905f839761813c138
-
Filesize
1KB
MD5b1e92221e8b19b175ff309f7fa67a167
SHA15650a073a7e7541b5aa714daebe6e0d4c662a216
SHA2562ff5806a101e6b932819ae8cae45a964f55cd967a9a960e818ae000419e987b7
SHA51277491f1eb03460fa99a000eaa3d318e9c83b419996b0daa1dd4b05af878c60ee5ed2eeee22c87963fcbcd5436720913ea1267e00928cc06853bc882f0ca7c64d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD547ceb90e1e14382b18160f079f660f61
SHA15bc20ca471e15ee3cac90577a41130787aba845a
SHA2568faa7fac61aa7df618db9d53f3561540dd3a9a410e4f3553019b73a88f0e12f0
SHA512d27272700e67f4fc8a9d9e4779450ec59206b1194d75099502d90feebbec768c1d5b3b6a825f0e9a0b84b4296f1bb831fcec6d728cd57595213110d78b8f9595