Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipalibrary.me/
Resource
win10v2004-20241007-en
Errors
General
-
Target
https://ipalibrary.me/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "232" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 2744 msedge.exe 2744 msedge.exe 2724 identity_helper.exe 2724 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3732 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1920 2744 msedge.exe 84 PID 2744 wrote to memory of 1920 2744 msedge.exe 84 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 1820 2744 msedge.exe 85 PID 2744 wrote to memory of 3884 2744 msedge.exe 86 PID 2744 wrote to memory of 3884 2744 msedge.exe 86 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87 PID 2744 wrote to memory of 4456 2744 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ipalibrary.me/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e0746f8,0x7ff92e074708,0x7ff92e0747182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12183372603972418400,11200435756643001949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38e4855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6f2a7bfd-b6dc-4be0-a2b2-c04af47311f4.tmp
Filesize7KB
MD50a7aab983cf128f14506b92187f066c3
SHA1fa6fe6f8ae9fb3dee5f5df5693cabbef6eacb2f2
SHA25651ab3f310d5e61d2d07efcdc67882527f0fb142c2a9491d792b418ae01f08c19
SHA5127ec5244e34a8116e9b2a9de561079060f71d61815d2539863433bc93c93c6ae4bf3f624bdf7e5518b015890586273ae40fbce9e1a7789c332dc3787e977736a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5d85d2b6a32a5dd0956edc76c9d7ee7ee
SHA108f7cf64b178ca5a18dc7a3323ab1c499778e49c
SHA25656ff3abf4eb86002c76bc517dfc50f67c7ab2e8c4fa8b0dc4caf4615f8166f59
SHA512a0cc56f9d57b17cb7ada87b22cb1d720fef8c4a8bb58693eb1f7276a04cc0a36aed96bdca3f7be6247c9aa0d20a2c3e248666934bfbfe7d2baddbce1c442a4c2
-
Filesize
2KB
MD5e5dc166f84aff3c1c892bb279c894fb4
SHA1de8bcdd0e967acfdf900865c2f1f0bdb303f586c
SHA25689eaca3976d04b15b282c31f4ff90aa41b2133296c14dee376a7af54014f5657
SHA512a7626b30f127da49bba51fdc45b3dd9508f14d696c1cade70b404706b7f3be8cbf1763e69e961380c1ccc27bc4a3757841580a72b5da140b029377de3ff24b1e
-
Filesize
6KB
MD5722fb306f6cae39e7452b51095e06fcd
SHA1fab888986b10cf3e7222ad6252d5ec3bf4bcf72f
SHA25612679349b0444379361bb2677367e05e40d86665c8ec2c9bfdb67461ab179ca2
SHA5122de5880a09826214d8fca8adeafbde0c0ac6716497806e488f165dc65b6a61369ffea227f4df1329162f36b83a78d0d655da7b545955251e567233e1198fbf26
-
Filesize
5KB
MD5a87338c3cd7f73c3845898a7c857834d
SHA1cdd4b603935835d6bf3ae1de7280f9958645e22a
SHA256ab598a2c6c589f99188d269f2a1222a634b09b8536ffe496030ba00b8896b8ec
SHA51208a369c837a518b87e2ece9d109e9e8a07e2cd9cf14ece64e45342956168275d5eafde422c75ab865ef1267e6afec6d5f2ef026e3a8e3af19006b696e70af9a5
-
Filesize
1KB
MD5b1ed56b7523a4d8af8fa11650669d3f2
SHA1c862de90c71fbe6c056e913118b681b68ddb74f1
SHA2568d9416774d5f860b1295e438043458927b82faf1ffbee3ca6d311809c6303e47
SHA5123dffbcae053e7361b0a02130a4b5770cd541c206e2c02af42b304f65e5a314fc2bdc0a5bdd286f73833f4de2e441cae859beaae2c29beb46215cc5cfedc22f0f
-
Filesize
1KB
MD5c2104d49554d724ef957e7a2449fd888
SHA13f15282e95478c0f833397eb6184f9274ac423d9
SHA2568a08a5925872c484c1a4475cf1575f2d6856a541de866a60c6b94c9e2a0b1319
SHA5129e25b1935d44a85e7d6b420df512a19b4093312b647400119f096c465bbb9dc68b944a1c05a33b543a3144416b3ba66ba1157d1feb6246f3ca8216300bfdc1d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56a5755f3d994fc00efdc2041f9384a96
SHA1394c8ac91424309624c4af60486055bdb0cadbfd
SHA25680585a75020bf5dd2b7d4f4e6308c5f912a8b523ae5c1d19bb6924757ab4c80f
SHA512ae6f0fce335bd63d221561b4619fc2ce65b3ab33aeb28698e90a879be5d545568d0a4f84a0ccea8ecc5756f0332fa64cbaca6b421a0fe984f63de8c19a34603a
-
Filesize
10KB
MD5e3c1552490f55e7efc98e5e1e7730210
SHA160d431771837a36688c3a34ed3b2b1e66c24e9b8
SHA256cd2d0188f30c566a05e72f9ee0b378172a5f150ecf81cabbe2823f866bfc2751
SHA5121382f75e2c62a07be47ac09433a940ad83eb9cc4404ff40986eeda306fc32429a696c053efcf2879d2204cd2e97ee6056ea1213a1e5bc3767075ec6b46b7be8b