Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 08:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s7d1.scene7.com/is/image/microsoftcorpdev/Instagram?scl=1&fmt=png-alpha
Resource
win10v2004-20230703-en
General
-
Target
https://s7d1.scene7.com/is/image/microsoftcorpdev/Instagram?scl=1&fmt=png-alpha
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 2996 msedge.exe 2996 msedge.exe 2664 identity_helper.exe 2664 identity_helper.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 5064 2996 msedge.exe 82 PID 2996 wrote to memory of 5064 2996 msedge.exe 82 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 456 2996 msedge.exe 83 PID 2996 wrote to memory of 3472 2996 msedge.exe 84 PID 2996 wrote to memory of 3472 2996 msedge.exe 84 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85 PID 2996 wrote to memory of 1228 2996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s7d1.scene7.com/is/image/microsoftcorpdev/Instagram?scl=1&fmt=png-alpha1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe57ae46f8,0x7ffe57ae4708,0x7ffe57ae47182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5623673968016988406,7619364630828541885,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
183B
MD56ab05260519434d37d50441d23d8c4b8
SHA16d0967b01675480caf1c3e7e52ef6328b252798a
SHA256f905ada4cede8b5fd44ea6aee257f57aa417dcfa3441ba3bca248c52e055f0b1
SHA512baece0ac42c7b875955ebf457db5f361c76de96879a499ed46595e5805ec10b8133762102e742f1f165b33a3988f42561e1c0964659f6d87f943474b42671ffb
-
Filesize
5KB
MD5a01a87c6a5ba7bbdb3f08b07e08fb0fb
SHA1ddfc758a3c4d6595eef8f2f0f28828c6a70d4bfa
SHA25602aa5d9243bed55dddb9c848836752fefb6b8eea60700cf9b5c9d77efbdf2b21
SHA51261de52a4491fa4c25e39789de48182a4afcb35e9603df56bcee6b179858a4044bbc74828e18f93048401843b072d2c4ca82fd1ffe3798086c1dcf6f514e40768
-
Filesize
5KB
MD5e7a3f82b40c8d960adf32d181a1fc34f
SHA1e42f2b02406ff55443bf096e207c0bcf62849921
SHA25612556b856636a6bbabc85477cfffc9ff76296e56d0a5239222dec8cabec7f5a3
SHA512079e89ba22caf5596f4fe4fdb2fd66165db3eb896b1a859eb02e62b5b324d94b3f8417cbd37c9d84fbd54f1b153c58b0aa156c72eec5c22d34a5808e8ede2521
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD598f6cc6a5e31b98c58fbfa9c77781fa6
SHA1fa6dd0252aa90e433544a0266c006188e63abf53
SHA256c0f0bfa7dfd2ac684af4ae61a500f52029dc845d381543323e5bb5df6277ad39
SHA5124c345018fb33f6f9464772eb213ac106cc1b74e132c346bd48e7d76c6be50ab9b8a43b060441cbf1bba2aeb5fd28fa3125e52dce1181fdbf14cbd7b874c8f258