Analysis
-
max time kernel
1680s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/11/2024, 07:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Avangelista/CowabungaLiteWindows/releases/tag/1.0.2
Resource
win11-20241007-en
General
-
Target
https://github.com/Avangelista/CowabungaLiteWindows/releases/tag/1.0.2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 128 msedge.exe 128 msedge.exe 2532 msedge.exe 2532 msedge.exe 3944 msedge.exe 3944 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1328 2532 msedge.exe 77 PID 2532 wrote to memory of 1328 2532 msedge.exe 77 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 1028 2532 msedge.exe 78 PID 2532 wrote to memory of 128 2532 msedge.exe 79 PID 2532 wrote to memory of 128 2532 msedge.exe 79 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80 PID 2532 wrote to memory of 4764 2532 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Avangelista/CowabungaLiteWindows/releases/tag/1.0.21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff20773cb8,0x7fff20773cc8,0x7fff20773cd82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,17978095978734878507,12021863964783225737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54f9378ddbbf1b0b2fd541ad979196455
SHA14d25e032ff428b07e6e834f40d5e8a6bd7e8c99b
SHA256082d2ef0f359b264886c7e21b9be96ffe15fe1136465cafdf23cd9eea4459f3e
SHA512be45282d1d51c9c526a0e253f439dfd149acf24eae5633d37086b485108c8bda10b3aaa0e24b9940899f5e11d4520eb0403cd17ca71edbb84cf02b24fc7444a8
-
Filesize
496B
MD5d22266ba3d8db30279b96944f0cec985
SHA144e288cdfe75a5e8299ce32e75dd9e0705cdbac9
SHA25677873629fa695e434160c86ae9116906ff65a97666d7d35a3ed63221b627c0bf
SHA512d463aecbdac835dace5544b4267c86c2ed7d3165ba95095db6dfc3a25655f2391fa202a81d37b4a76a36f04456ed86df137302ad0e456fd59ecdfee3c69c6c1b
-
Filesize
5KB
MD5ea0293798c1d60ebd2936cc6f5b41899
SHA1f6075414faea99046ea7b8971a928767f69f7a55
SHA256106a109037b215eccbdd17bc24ef19087408810d34c8c74db6c2dcc252cf75e9
SHA5126c345ff5cf15646c9d030ee0ad1935fc012787a1d39320b655233099cc72be94c6da3e3524db87c2af1ed34c8d80c82abd21f03e9e0c74e198eecebdabc9f977
-
Filesize
6KB
MD5077b64e488374e828f37e879a2d883cd
SHA17a500fe7bb808b2df326a1ec17d1d97dc8aa8139
SHA2564ad8dc8c912841129c9bf58eb00540125654754ec39491c0b470b1fbd343a75c
SHA51278e4b9e8021dfcf6879cde126bcc2a424f02f4d964b9b4a2a7d7f362f2e04b6a9e5399dc95c984038072c5899cec33c16c4161308c5e4cd178a53402b62256c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5327f30167237bccbc2beb7583fa6bd27
SHA14d42101373a69680b9ad8c36c59e4b97b25c961f
SHA2566e61da65a34f42845d6c25d036f2cf0bd74348fa17ecdb1924ddafe76690ed77
SHA512003a0d9655bcfabdbd183d53da60b0e7a787c7c8d6fe5fe2e45a7527c8738b2fd35b977866da55464c0c8f1e6f01691f82a4125975d7e676e91196010bdc516f