Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 02:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Resource
win11-20241007-en
General
-
Target
http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 232 msedge.exe 232 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 2352 msedge.exe 2352 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 232 wrote to memory of 4664 232 msedge.exe 77 PID 232 wrote to memory of 4664 232 msedge.exe 77 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 5100 232 msedge.exe 78 PID 232 wrote to memory of 2644 232 msedge.exe 79 PID 232 wrote to memory of 2644 232 msedge.exe 79 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80 PID 232 wrote to memory of 768 232 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://safrareal.com.br/yoya/ecyoovf6nr1zdye7v7dgekhufraq8zdjadg7f/YWdsZW5uQG1vbnRyb3NlLWVudi5jb20=$1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb6ec53cb8,0x7ffb6ec53cc8,0x7ffb6ec53cd82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14464153977304088855,1840491816232198413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2496 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
Filesize
218B
MD5b02350165d3b0f279b56fa2b3f7e707b
SHA1b8ed8a3ff1b28ece9c412bb2aebf3f8c243e925a
SHA25604aac4cf1d7c3ed2ec2f453128887ceb927a6ca1557df37a7a7f5f5608004761
SHA512c16ec6f71e8bf8c84a659541582b8b068dfe483358b3f896ba61e79da4679a97b4ffd6418ace10d4063105c9998b791f40c0054cc8e4f1ceb05f79f26f57527c
-
Filesize
5KB
MD5470ac7b534445fa4068c734ffee96d54
SHA11e2d9f91a67ff5cdd308b19b88fea721a69df678
SHA256b9d537d0129b3619e53434afc180df95c6cb819cf35372860340e18918545e41
SHA512fd9d01082d90d73d70c9558734607b528a1c2d4475b69729326570f26afd8513d1c5f979aa97714935e47cce2cd4888d06f8cbcbee6791954994b864cdc542da
-
Filesize
6KB
MD5a1931f2d8be3d60c2a5272920d08f0b3
SHA1b0e7ebedd332ae8ddd7839244863a60ea0dc23ec
SHA2561acd6f6f5953e0d07a9cf9594a27ea9ea051c32accabb30acc7f97ea07d7a683
SHA512e791d989e4696c65f5f70d16c1f3ad28bf796b391198ba0269aea346dc517ad047a91f7536301f01101ff865fbe05367d60a4668667319b407a25176c4a793ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c2434a02325e1f980e24f9e4ddd295e
SHA12b99cac7ca0c8261734751c2d9d4552c2407d3ef
SHA256e14fc0055d92bc889b4c974d6c3b6e3498f877f00653c69610cbf569389ee8c6
SHA512a8a51513ed88226a5aba8b103dcf360aa0dccb39194b72e28735766ef0a3cf1cd17da96905976fd7d4420ce59163b69388badbfb20e6a3a5f62c7449254d18f0