Analysis
-
max time kernel
241s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://breakthrough.donorris.cfd
Resource
win10v2004-20241007-en
General
-
Target
http://breakthrough.donorris.cfd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 2840 msedge.exe 2840 msedge.exe 1312 identity_helper.exe 1312 identity_helper.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2564 2840 msedge.exe 82 PID 2840 wrote to memory of 2564 2840 msedge.exe 82 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3236 2840 msedge.exe 83 PID 2840 wrote to memory of 3360 2840 msedge.exe 84 PID 2840 wrote to memory of 3360 2840 msedge.exe 84 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85 PID 2840 wrote to memory of 3548 2840 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://breakthrough.donorris.cfd1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,272876453046272595,5785115458180975030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD529fe8f865b6b169c03d8782b1e196ec3
SHA104441494f035c910fe0a17672a9a260628132a4e
SHA2563947d8d1dfe4986360646d8065f94d83f9b39c86aa65e7bdf6fd8165d9c5cd07
SHA5125cd57b69bc8edf3d17f30ec4f7f9d4b301e5d88c714b6b7a3fc23bf05c0c4036a6d22231402b5250eace629ae5e3a4c08a548ffcce6391f25bc51db02e14ff65
-
Filesize
2KB
MD5d6989c746dba00a59f387b8514652e9d
SHA143cb6fb32d18a1883115ac91515ef43978377dd9
SHA256b5cd60889c3f0daf623b84c4606a15c38ddadee14e2abee2ef254da4ccfa9cd3
SHA5125bbb216f4a408c21ba3dbc6c82582f2cfc70a3e3d0798006ed02fdeab7960b2026fab206c99f9cfc629c47996e3d4ec63a8b2308ab90602231f5891fdf789a22
-
Filesize
2KB
MD59966b3e1645b3699b59e4c9c6ebac72d
SHA13e36303bfb9c35245d44a1b445104ea8eae9df9e
SHA256c3e3a83a7519277cef38ca8a2ac473a30f58525e1c9c5464ca4274b654f56a94
SHA512c677668b9e769f199d5d96a9b50f51585a3440e699afda17054ea7e2f92a0b8bbcee455322aa18c10b5570db39022b6cf0aea0cadb3986d715fa4ed4a143c8ef
-
Filesize
2KB
MD57e7313e38e0b66618cdf7e37b53339d1
SHA18863ce8c76f7a5dec9f064ac6ecabe18433338dc
SHA256996a39a59f73a6564aa97af75fab718ec70318401feac96096c0bc1ca0e4af40
SHA5125c64a5512065b8145de6609c5bb15c0629549be3325ecd4d45a686ba98cff4a7ad15f5eaaa83544823bc8f47870b8f9b0f7fd78a5bab61510365025e704eafbf
-
Filesize
7KB
MD5dcd28af45ce06b06af75a4d3ce994285
SHA1afb9e7722b32497c42920f5e3bad1ae20240e33c
SHA256b62a0b63ecd4828e38d1ca0a49d37bc1fea47ca3dea5c4a4357f649739144699
SHA5121d9a52c8f4a02ebe496a51deb83e1bacc8ce506867d8d4d0b5837cf4ce21cb40ca40a849da12f7477afa1c4a58dc5d67500033e198781c69b3b9228bc4157c2f
-
Filesize
5KB
MD503751701f4b3cbfc34fca94665177ddf
SHA198d99a481f35610c2cdc778b26794501bac41fa6
SHA256c2f925f66f345db9af18abbc6a3a4409b04df051fdf5a3b084075300ee0a3eb2
SHA5127cb755e471828d6f03d43011606d5600c30c42d0651142439adeda4141499b594ea02dfc68feedaae3b0f9fde413040b61cd18ab7fa1710cc94207d19d1eeac8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e87c89ce24c9485cf5bb898f29d8ad3c
SHA113e7b35f7e5bd7479a850051e4dc26bdedf81963
SHA25693cdf45d3dbe966b441dda614fe30bb468c8e100b4acf3476a537a181264e5d6
SHA512b4cef28887a69ef50d7a03284dcd539ea3f0b4fec662cdb462912cde2c916651fa5aaa6232cbc86d05864d10a77da99209f0111ba56d31b5e9567c6cae58499b