Resubmissions
20-10-2024 00:05
241020-adhe3aygrj 320-10-2024 00:04
241020-acxtcsxbmf 819-10-2024 23:57
241019-3zz68ayeqp 1019-10-2024 23:54
241019-3xxy3syejp 819-10-2024 23:50
241019-3vygtsydjj 1019-10-2024 23:42
241019-3qhwksyaqk 10Analysis
-
max time kernel
1800s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 00:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1108 msedge.exe 1108 msedge.exe 2248 msedge.exe 2248 msedge.exe 1876 identity_helper.exe 1876 identity_helper.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2580 2248 msedge.exe 84 PID 2248 wrote to memory of 2580 2248 msedge.exe 84 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1892 2248 msedge.exe 86 PID 2248 wrote to memory of 1108 2248 msedge.exe 87 PID 2248 wrote to memory of 1108 2248 msedge.exe 87 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88 PID 2248 wrote to memory of 4592 2248 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce88c46f8,0x7ffce88c4708,0x7ffce88c47182⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15143903839822400628,9393493744718473753,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5236f57b9e5f707bd57b5f696348450fa
SHA19a5f1403966b3e4f4980c0575f71bc2b55f10ab3
SHA256fc05a6781b0ed848f59d64f756206515787abf899a4960988f78301c088ea0b2
SHA512ee0ae8af2dc148d70412c94c855643b8a7cecdab214a00c5b6410a0f76a1333ef1fae555f2c91e25afe85fc54e54d2b8de0f53b3f5896b7725794d6035ac12fe
-
Filesize
496B
MD5406d40f57c41b87d19b999ebfe5296fc
SHA17d6ce47afbb25a87565cebdaf0a1a2f4af4bfc10
SHA2560d179bd1f38ad65839441984c85dac651e393eb75c561885911cb8cce8be6974
SHA512a763d98c4e196a8f81244761848a52ab25cf2b4dcc91ff8a977828a7f3639f05248463828221b575942a4c99dc5b720703339e4cb59e11a301fefa6236e660fa
-
Filesize
5KB
MD56e769e30d3a029de9514070f730a1c0f
SHA1ee7496efab1e4249e26ec366fde9dd2d94be46d0
SHA25646db5ee64ccca220acdaafab6e9f446ebcbd889da2dea2bf11603fb85dfd4ad5
SHA51203706ce940acb06697efb1a8a5c86d7d5a7c10ab29e42acd2447f6242bf17cf4b3dd1a5d84ee7eeb55e3f96eb3a1c127c7f1d55108c3e0ef367dc4d292548d01
-
Filesize
6KB
MD5dbcafc4b0f198c13f33a9eb58b8c3dc0
SHA123ef8f2fad348a39867cc1f9307be5ae2ceadb35
SHA256fdf85e59eac3a528a411f740a3f77e6e2628cb09c5ca65866313996a0015b8d6
SHA5124a4938339c7e5c18d53e4259d6e91f91bc3706e2d56353e5c717a35ee2b1de958152b305b478203277c6a3c2f0e3ac75f8cf5cd2867f0420832c2f2b1945baad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e299dfde164535303977c84460685003
SHA1fc150e226b942a7cc68fbf28dba90088bda5a1eb
SHA256d51fa5bb1327e4961a29d817fd5006ff74e344e2494be90960047baf86a6e3fe
SHA5123bffaef6fe414c75fec3b69cc8bc7befa6fafdaf3dbdc21eb6bb979494972988ba050f2561f03c50da9dafba0638c79f3726bbb6e86d76c7e69fbce0db06c2d4