Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 06:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.festalles.de/hand-shakers441/
Resource
win10v2004-20230703-en
General
-
Target
https://www.festalles.de/hand-shakers441/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 4764 msedge.exe 4764 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 1824 4764 msedge.exe 85 PID 4764 wrote to memory of 1824 4764 msedge.exe 85 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 4688 4764 msedge.exe 87 PID 4764 wrote to memory of 2244 4764 msedge.exe 86 PID 4764 wrote to memory of 2244 4764 msedge.exe 86 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88 PID 4764 wrote to memory of 2200 4764 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.festalles.de/hand-shakers441/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8d8646f8,0x7ffc8d864708,0x7ffc8d8647182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11422775527053521992,13788822273666840316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f00468e9dd0a7d46e190a2403189e04a
SHA1dd1c130a485d47dc1851ea99f8a2f49bfea4a988
SHA2566b64e08007951651eace6ba681a53b3adf9cc37fc3e841f450d1d271fcb66a19
SHA5129137602929b9887d37bc8b7b7af4556be043be547f1aa82d2d9872f042236492342cb154ee9f5d7cba755306e4395cd15d739db7cbb0d985d4c51dcdb783e470
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
823B
MD5c134f310faaaf6b2e87b8b6a7ae5a477
SHA1b37ea21299a36deb71c8f491c36a320b35377b31
SHA256650a21db4449038832edf28b7b71059c7946f820c12c6bdbe6857e40c691504f
SHA512671df29941cb7d38419a18effb0498bae63efd58093b5291cc223613320a7757c588d77a041e7edfeea3f1e7248ae70a1393a2780658c275511b7a93a90b1778
-
Filesize
6KB
MD5e107c1842301de58562af79c546743c0
SHA1262a9931719529e03474b0cf10742b364d88232f
SHA25658bdf6e505b3c37a04fa5afdcd81e236f2f5fd70c116557ff50f2e2651edca64
SHA512438fe836b16bbd2f81008ee52db671407648afcc3e8be3b2c141ae0d43eeae0e203e494df8d6fa4a6786c407c2333a9f1e27cd17339542305e917bc8db2173f6
-
Filesize
5KB
MD5ab82f6c88e62b720a4d6319e6809e337
SHA1bc681a2abfc50b8f7bd080fc7b091fd9fa3ae940
SHA2566aab55fb4b4db108b63a80a2bdb25211d43d74f145a5bfc8798b6756c9d4b618
SHA51289fa98ee47ea290aca59997cb74ff83b283d483ce00d9e9681c14530d1d73a19d84d8132196f63a6394af9b2bc6c87e75a3c4e9bd24003a36c5170306fa76199
-
Filesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD54d9ac4d87f1cd0a15c28863b29da92c0
SHA166b8a9b17182b7e64827e5e8d024570cbcd08f42
SHA2561270b0d3f4c4b55aebd26f896a1123bac3312ca1b86f9f4e2f3a454f9a3ce927
SHA512daafaf43a395e8a3d9a90c038d5a873998c05e06687f24f33d9c4a6fe4ce06014912ae3090f141a2cdf5a52ab4792c849f74b4457374dba8f54d3f5d5b02bf81