Analysis
-
max time kernel
303s -
max time network
319s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/03/2025, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/MasonGroup/SvcinjCrypter
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://github.com/MasonGroup/SvcinjCrypter
Resource
win10ltsc2021-20250217-en
General
-
Target
https://github.com/MasonGroup/SvcinjCrypter
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 29 camo.githubusercontent.com 30 camo.githubusercontent.com 31 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 1664 msedge.exe 1664 msedge.exe 3900 identity_helper.exe 3900 identity_helper.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2556 1664 msedge.exe 84 PID 1664 wrote to memory of 2556 1664 msedge.exe 84 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 5092 1664 msedge.exe 85 PID 1664 wrote to memory of 4992 1664 msedge.exe 86 PID 1664 wrote to memory of 4992 1664 msedge.exe 86 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87 PID 1664 wrote to memory of 1176 1664 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/MasonGroup/SvcinjCrypter1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7fff3d0946f8,0x7fff3d094708,0x7fff3d0947182⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3455647931257725499,764096451533160989,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57fb0955b2f0e94f2388484f98deb88f4
SHA1ab2363d95af3445a00981e78e6b6f0b860aade14
SHA256a7c4cb739d577bfc41583a2dbf6e94ae41741c4529fe2d0443cd1dabefef8d15
SHA512c9b6b6de78fb78c11b88860cd6c922d11717f5cf7477f602f197531aea114270c2b7111f66d96f60c3a9317fbf203fd26222e81d2d0eb70ad6515f5af1277edf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD558796e4d48ae83f3d0eba03a7a2d61c6
SHA118771e2a58eca176f2fb5d496dbd702178beb029
SHA2566ef55fd4600d6db6074407a1bb574e8a42c9c7e4e9dc0f181c21b71234c9ddc5
SHA512e204ad69c63859614b09b289d74633a0cccd89a816c8525d334d2484e5d873247353236b843763c7280778a57a74cff5b7bb4250c7be39c26fed9d29b25c0370
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
580B
MD5d4305c3993d0f27893ca3069f2c3cd3b
SHA14be9d9cacd91df869880b95b5e6ed81f0cac56e7
SHA2563f84ca13bbde91f446495ebe7e7ce116607704bfc4aca4284fb7c27a882f4be0
SHA5127b31c706bcc1bf7a41da090e0eeba4bfb930b948dbb84896a27cbc9657ae5821cf9d125e8ec54967e3eaaa0ed6cf485f708a15379ecfdfaa8fd084e4d7d357a8
-
Filesize
5KB
MD56e295b6db8e4ebc950f4c771573d4466
SHA10d30ddde0a822aa9be45f00e549a9ed3fc1856b5
SHA2560bb7e4776738e5573a02aa6b24f368cbd32a418c972cdba9c24783604b8bc072
SHA512271521e9e47b3e07afbd67e3702998df9c0630100c1969d11f7c86e6c9b18920cbc2c97a49597510a151a1f5c88c5a45b6567aa34f2d4e06ce988d09e78bfa09
-
Filesize
5KB
MD52724e63fb3bcd9f92505d93e63049e4d
SHA1437026f072672b7ff80bfdf3057572ee17cfc761
SHA25648f6c1b90d68ec3a0f6806107503997cce5d7423722fb888977c665ee05704c6
SHA51243fbb11c3a1aaf5d858c3cdca0d6af952a5adc5affc1d5f1c06d4bc7db9397453dc8409589d2b8e89d9e18bdad2e89d87b7092ee2c1698cf486ec6f8787e364e
-
Filesize
24KB
MD52627e6345730a6a479da30c0883d24a5
SHA17442a41a25fcc5415e1609b647c6e414a32c7b99
SHA256640a5e5b62d5e5ce53f120e2238d95d61f09b45d0d4035fcedc0f452c431b26d
SHA5121cd1044e89ebd307c088b4ebe587d41dee3b6dfcb10fc4f70f95819fc9b1f98132b9715cf1bce76d5f15d97802e85776f2ae6bfb293c4d033e661e5d34354d28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51f810b97e102c0ca0e29e98801589d26
SHA1b8a41b5a79832032dd94080b8d5bf3521ef37b83
SHA256e11429486d04447c23ddc355040409bac55b84442190d5afc97784d3cb2f3dcd
SHA5129ad1a744f017447a138704984b5f5ff1f142940431cfa40cee5fd87b7520d85d9ef26fafb1f788b312885e49e4663dabcbf2422c74cd9d06bdb31a05d63fbbae