Analysis
-
max time kernel
10s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 15:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ro-exec.live/
Resource
win10v2004-20241007-en
General
-
Target
https://ro-exec.live/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 704 msedge.exe 704 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2572 msedge.exe 2572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 556 2572 msedge.exe 83 PID 2572 wrote to memory of 556 2572 msedge.exe 83 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 2984 2572 msedge.exe 85 PID 2572 wrote to memory of 704 2572 msedge.exe 86 PID 2572 wrote to memory of 704 2572 msedge.exe 86 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87 PID 2572 wrote to memory of 3624 2572 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ro-exec.live/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da5d46f8,0x7ff9da5d4708,0x7ff9da5d47182⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3321151200648805387,15825174841080638025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,3321151200648805387,15825174841080638025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,3321151200648805387,15825174841080638025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3321151200648805387,15825174841080638025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3321151200648805387,15825174841080638025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD55dcd05b7a4bee25c60e0ec808043f406
SHA1d64852aec395aa3dea8a13620b3b378ce354d9b8
SHA256d4304627660b4857aecae9360e8969155f35d56620836ccd0893a22d189b0616
SHA512b4a6e7b88c9f718f4de00f19ab1c7a7d38216a34a7c822aea12cc611a1ce65f24527e55c6486503358516936cf750c0049c7e387fb0495f7e894c9b453183da1
-
Filesize
6KB
MD5895a459daab23fb2d5561925743920d8
SHA101259635318e9aa478bd2a35334d4f3f3048c555
SHA2562dcacced6e73d6bf696e03682a38bb9019466045d525a998e6cc3fe98235a176
SHA51273f8d319cf03fb823bd7682bcedc9371dd9c9853610818ec9c8faeb3ce24f82dbcf5716ab198bf8cdddee3474789412672f8c6234299063dbc142dc24c408fbd
-
Filesize
10KB
MD53bc72212293c1393af4d6ca82d9c401d
SHA1ab26ad4a29788139e2d441002eb2aa621db01d8b
SHA256366822e9a0efccb1d9d901253a82c805fb4bb4976f3cdc2c27b12b8acb3afe6d
SHA512f6265432550e93bfda52ded92e75bd647ad694d9ea03d2f64caa7dd87d7345d757cdc2e039fbc1fa5342225ff3064dba42b2bdb48becc051422aebbb250e9b10