Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-01-2025 15:57
Static task
static1
General
-
Target
wyvernunbanner.dll
-
Size
292KB
-
MD5
944729dfb3117fd4ead1f47846e02182
-
SHA1
53c890f62851b9c14b4b2f2167a6c142f174580a
-
SHA256
189dbe39de284a00399a039e54f781180a3bce47f1be75a1ba6e9c61724c3e46
-
SHA512
5807ab8bb56659fabf1b85bc7513bec129524e1f67f465390f8219dd62026e3dfa61d36b0a08d301c8bcc50be3889663c4dab09ddd4616765abf522bbf403bed
-
SSDEEP
6144:R9xMNNCYlnkv3uhLTfHxkBkqopYomvCyQOdN44Ngl5e4hHeYv:R7M/7+3+T/yBk9yQOb44Ngl84hx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3468 msedge.exe 3468 msedge.exe 2368 msedge.exe 2368 msedge.exe 4720 identity_helper.exe 4720 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3228 3144 msedge.exe 80 PID 3144 wrote to memory of 3228 3144 msedge.exe 80 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 4908 3144 msedge.exe 81 PID 3144 wrote to memory of 3468 3144 msedge.exe 82 PID 3144 wrote to memory of 3468 3144 msedge.exe 82 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83 PID 3144 wrote to memory of 3044 3144 msedge.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wyvernunbanner.dll,#11⤵PID:4852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbc3383cb8,0x7ffbc3383cc8,0x7ffbc3383cd82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,1717289218798020137,8044282692862494453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5267d179927d805a04a1e98cfe8c2b8bd
SHA1fb9562a92f2f86749369fdcd99c32ad923d5332f
SHA25631b18d187b052dbb81faf95285e124d51340561a1f7eeadbc17fa826a7071cef
SHA51203547803111a19669d5cc63ac89dd9322262fd6fc50bf2bf7ab948b31ac6ff66c061f185bc0b900670d7bcb2f108cbe489e862919c27d771614d947a03137008
-
Filesize
758B
MD5d7bf1ea5845d7b964c2653c01d7049b0
SHA1b92980a589c34efd958c92b31ef78e9274b17107
SHA256639f84f7eb8cee0868010585d8091d01658d2841682c9c8f0ec49e2f32e5da9b
SHA5128e5f1314a0fb32fe6c261079cd7ce12daf566a4699499f3ccb9ba8998bacbcf491ae4f395780fc719222ee08e6df18fc66d3ed4267c74918a9ebd491f952c376
-
Filesize
5KB
MD53db1a6c484ea039a98cd738abd9ab0b2
SHA1251c6f50329756036d09bf34aa26e5707e0ae765
SHA256f5e0f6df60c84d8eab3d56b4286bcd140396c6460089cd3693d462a1c60b56fc
SHA5123c8b8937a9a08ecf2da18552b38df3dba2d9a8849f0bc9d8d00363d8c1b24fc29f735be91abd6500f5623fb263d959cc0722d7e9a99132c2d5140ed9c2d90727
-
Filesize
6KB
MD5a0f566ea4fca43fa54756b895a452b49
SHA1b3b207a0cb082b0cddf3837accddca8912db57a5
SHA256b68df6f837a013ba1e41128ed3f5c53f87e33fc70aba48d0ebed044334c04e0b
SHA51276b12264f9fbbb2ef09fd26133484be7ab80125f7514ba81b48aa1152a83fd5940ab7edebd347ba2ddef1167e87323441ac1a8251930fdf7764fa4d6f503af49
-
Filesize
6KB
MD5ed253471b23678331b2c26c468bb9cc8
SHA144e239878b2f90395550c9b5b3ec4e4fdb80686a
SHA2564ab0f61e438284b04635469f8bbf7bde6a5c2ab14a0a5c567143849f4ca47f9b
SHA512a2b1902d9a7e511b224625e2dc1f1e5e329b25156d3c273a113bcb25cb43d3e753a95f1f2fdce9c577df93b0ff978f84b713e5be4667c1c8b43a957163d0ede4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56e50ef8c4ee5b4699cf54c4043449217
SHA1e61b96bcc3dc417895882feb814c17eea038260a
SHA256cf04301a74183c4da0edfe5193a8832d9d4fcef55a36577ec5c0e4fa1630835d
SHA512acd43c4e6f2e5e539d86e2be69e0f52784a14a826bfe501dbf7ca99e0a99901c30de4d297910b08afbea3cd55091b06d747f9b6ffe400de5be73f7887aff9c5c
-
Filesize
10KB
MD5e7b1077848297f9b3304801b893a26f1
SHA1ef33b32c128e0f490ce882c3d38fc99444e6e6dc
SHA256cababfe61423a24f8a76bd152c3caf9575a377187a2f0eb84a1fffc687aa0ca8
SHA512036402a19374884778791101b4b7082c6415340089ca9f47d3c27041bff85316e529aaae9c287ba0ea023bd91f334c9ef38bd7b183531961b0ff8800a54a5e8e