Analysis
-
max time kernel
40s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/braycarlson/alphares/releases/download/1.0/alphares_x64.exe
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/braycarlson/alphares/releases/download/1.0/alphares_x64.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4296 alphares_x64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 430696.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 572 msedge.exe 572 msedge.exe 2316 identity_helper.exe 2316 identity_helper.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe 572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 572 wrote to memory of 640 572 msedge.exe 83 PID 572 wrote to memory of 640 572 msedge.exe 83 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 2284 572 msedge.exe 84 PID 572 wrote to memory of 1548 572 msedge.exe 85 PID 572 wrote to memory of 1548 572 msedge.exe 85 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86 PID 572 wrote to memory of 952 572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/braycarlson/alphares/releases/download/1.0/alphares_x64.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7cae46f8,0x7ffe7cae4708,0x7ffe7cae47182⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6492 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,9585088699181214750,18273643565545083701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Users\Admin\Downloads\alphares_x64.exe"C:\Users\Admin\Downloads\alphares_x64.exe"2⤵
- Executes dropped EXE
PID:4296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD5bab69eeb8117239dec24b09af917ddd3
SHA1f52ea8512cb2153241704f1422eb239de23926bc
SHA2564bd6fe09c1b993a30fe0550d1f1525c2ff5e6e6512c928be7ec32658ddda839a
SHA512554f3c70f6f3df5567a53b07ae478d3a91ec51a15ca32412fbaaf873edc5ee337a9524a05e97f8614e2cad19b4164c70d3d2da4da4b8d11eeb94e07b38a8eb03
-
Filesize
6KB
MD56c3bc68948c714fb8c0143a9ff0ad5d3
SHA1ba1ceb49785412e3bfa015789ffe8dadb7ba3db1
SHA256c5acb87e5bb5918e275a54c980d1020ad7ecc0d74f8a2b8a16d3a550343b098d
SHA512ed080c2757fbb5097e59ff2b05a5d7569c321e523e42625dc7cb4f27a3a1e3489b0aae331fe1c424e86ddfd1072e8e087646a1a628213975a48cc182067814ba
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5edb58ef12fc40de1746adc1503f825ad
SHA1835261b946b6568f51a8011dd6b970e8054ed4e6
SHA256667882bbc2cc01e897d9076c407da36da128e7aa0a9b20f19005375be3c6370d
SHA512548896541aafa8d65d31d93732a3f01439e7c41e5643f3cf00333708d7e576671bea04ca765d617f51388216382c2d11eb1d9ab14c2dd9dbd40afb207e718000
-
Filesize
10KB
MD5f85d60fec895b27d37c6d4434b2fdad6
SHA1552f14711f45ef12d3a9a089a074574105a5ccc6
SHA2567ca862702973e2a9cde46e46b6a3a9d9019bfc72143055984ccaa89c29d06c58
SHA51241307b86b6f7ed71096e904fa87faee4c3f1ce1766fb1e939352b82bda174f339f703fc1d72ea44b892adfbb92f4c68849126dd6f7918f90a45e905a6996eb99
-
Filesize
533KB
MD5305a80f15034dd96fb8a31ca54d3e675
SHA17d0a5c6e493069418f82ea724e4d654a2cd1370d
SHA2567c50f9615a0787084ad116f6a018360195dd73effcf2e2399b21a2d6e2dd1c51
SHA512e1df37503e067290a20b3619804f65be59007214f0ca1921da9e5bb2c5f895c21d058f90effd2231f8e7721ecee5ab0378fef52ed79156f6375eb143246698da