Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-11-2024 17:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dar.vin/v4update
Resource
win11-20241007-en
General
-
Target
https://dar.vin/v4update
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc Process File opened for modification C:\Users\Admin\Downloads\UpdateV4.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exepid Process 4780 msedge.exe 4780 msedge.exe 1060 msedge.exe 1060 msedge.exe 2428 identity_helper.exe 2428 identity_helper.exe 1400 msedge.exe 1400 msedge.exe 1412 msedge.exe 1412 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exepid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 1060 wrote to memory of 1012 1060 msedge.exe 77 PID 1060 wrote to memory of 1012 1060 msedge.exe 77 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 2156 1060 msedge.exe 78 PID 1060 wrote to memory of 4780 1060 msedge.exe 79 PID 1060 wrote to memory of 4780 1060 msedge.exe 79 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80 PID 1060 wrote to memory of 1308 1060 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://dar.vin/v4update1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa21533cb8,0x7ffa21533cc8,0x7ffa21533cd82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1712 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,6372829843987996498,3575815363005834776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1056
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
Filesize
330B
MD565e6b3aa7b7020bbc70877e5a7c5a862
SHA183d2a59848570458bc9484833ee2ac30436b92ce
SHA256b2d050fc35aa581ba8d776bbff9b3985920058f79c9c133b21d6aa56640a98f8
SHA51270b03e4d1d0d26d81a8f037c8146f9600bd9ffac973d983f510b4f22e47630cb4d27a3349c6c6644617354a19246e102402fb5331e10fcd9614ebebd39150f62
-
Filesize
5KB
MD525d03407843e8a1673a370662c606d4d
SHA12c71250c093c7a372596c5c531a13fce0c55fd56
SHA2569b1cd9deabfca2b0c7abcc57fb6c4a7385655cddc03c25ac3607fae0d07a05a0
SHA512ed6734d924980fe76815d8b20d2c8e320c6a8d9b7c31191f2250bc47822d6b8028a94f84b50b09747ec06da17d594005a21a78701e0fdbb201d686c9e99c49db
-
Filesize
5KB
MD553192fd2e3bce04b8500455d56284e91
SHA126141fbfa516006fc9f83726f7bbc0b0bbb67326
SHA2567ef45130fa5ede892fef1d7d6999a384bc49e0473a3b2908f42bbfea6dc7edfd
SHA5128a480656a41fa8fd0656b747f7b02b2cdfd922fc261ff2a9aa787c0880456ae77d5842bf6ebcfc96e0e0fae2c9ef50eadf2be66ffd4f88e5491acee76b2ed267
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD561c0c6795c89c746fb5299d56feed75d
SHA1d72f9e0ad809c8551416ba101676c00240a9e75c
SHA256188d4288bde1abe5b29345bb053cae0403d5f1cfd1f62bbb46d97f1e012a5e25
SHA512f4584ab586b9e43fa251d1bd9d7919370c5a616c45941f6003573c616ded79f81f485dfbefb36eb37be05ff0cbe627dfa4a39851b2d838ebf6c981cd65c135bc
-
Filesize
10KB
MD50763b31a0a80dd6abc6a6f5029dad188
SHA1bc4d93fe503690b7e5cdaab2b5fdf64ae7888d8f
SHA256474b16de02daba8e95a40c2760b9c997ef4b9bc007d8255010d970ead8d03ba8
SHA512852e278b48a0f5c990945aa2a3ec43d77427bfa19ffc2bc70094b84a75d081981f27aecad51dbd64d85e2ecdac4a37c5c82edb48a0fce006fc581742bff848f7
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e