Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 06:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.jobvite.com/u?1BAC74E600954FA58DA783FE8EBD4C5B_7299D501CE8FA2E3EFB601BE5EB65B90A07627E107EE25E23399630B7F9F3F95
Resource
win10v2004-20230703-en
General
-
Target
https://app.jobvite.com/u?1BAC74E600954FA58DA783FE8EBD4C5B_7299D501CE8FA2E3EFB601BE5EB65B90A07627E107EE25E23399630B7F9F3F95
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4264 msedge.exe 4264 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4280 4264 msedge.exe 81 PID 4264 wrote to memory of 4280 4264 msedge.exe 81 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 2988 4264 msedge.exe 82 PID 4264 wrote to memory of 4596 4264 msedge.exe 83 PID 4264 wrote to memory of 4596 4264 msedge.exe 83 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85 PID 4264 wrote to memory of 1648 4264 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app.jobvite.com/u?1BAC74E600954FA58DA783FE8EBD4C5B_7299D501CE8FA2E3EFB601BE5EB65B90A07627E107EE25E23399630B7F9F3F951⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936bd46f8,0x7ff936bd4708,0x7ff936bd47182⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1971024911950071028,4140949525727693291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b950ebe404eda736e529f1b0a975e8db
SHA14d2c020f1aa70e2bcb666a2dd144d1f3588430b8
SHA256bcc60276d7110e8d002f24d66ebb043c5761e2a4b6ae7854983cef4beacd9bf4
SHA5126ba228e5b6464c9602db81de8e1189302d0b2aed78a8b06248ccd9f095ede8621fc9d0faed0a7d079b8c7f4d1164b2895c4d0ef99c93cb95bbe210033e40295a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d67004675f1df9c88187982065c8be6e
SHA1c2e5981cf77174e7d0b9c89993f60d6bcc184680
SHA256a65f01c6fb682c1a6e7b5f5068d093d1a4cd354f5454c05ab0232180fad78223
SHA512327697ded8f788ac88166e85af926cb252f4e68e237028af3fa5af8babab6670ae0b5a5024fc13267448127ae5f8e2af0639287db55e85ffdde2ca6752b70ae9
-
Filesize
757B
MD5628e68554952e19eabe13f441b0937c8
SHA16529cd24e3830f4c0173b2152d311414dd745d71
SHA256677418a14f142d932f9c5bb1b7cd9228583550f3103975593cd85f08ce9609ca
SHA5122509601503973bbddbb09a5e0fe668f50f78fb10532f016021ca5b9800ecc71468af0bb36f3df348378bdd56e020e2677c68e3f7d7785a40c0bd9ab95eb22f33
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD517f4aa61a9f68995abd829135ecd2733
SHA1610f4f123750b31da688ced070e4d9b2259350ba
SHA25663c899d822322e40357591f630ce2217bd807f26126198e81c0a70ad37a2a5cc
SHA51210abd1460355a8c280151ba8da731844dceb11f2d92422e866fa558ab99a8eed09979fa839ece2ba39255016e306e63c313a088144bacec5a1e8d2007e8b58fb
-
Filesize
5KB
MD5cf1c5df0f0d6350c0ce65554a674310c
SHA18e72ce44c0b3bd4ae164b2f09a7c487dd7ce4bc9
SHA2562adde568f3ede18b0be76bb2271a8e715eb3e3a8c4ccad982286b2c28faa0745
SHA512003f040c9f5f261ab0930c62d26231d1101f5fb567ae55f4dfde136429fa6eaae225e613104b4a7d03665edb86a9386ecc3fdfec9d70472c1f47dc09c77d64c8
-
Filesize
6KB
MD5a5b937ed9ddf8822f66747238e50a18c
SHA16fb17eb9e187b8921bf05f357193487257395e3b
SHA256844bb87c99865d942d04841698afeb55842eed4544ba22feb36a98e98d1b85f6
SHA512ec669949120bf16e80dfee760ca39f760f62d4aa65200c5c37208127ba5f1f05c97d911d06403646851fdcc965b4135d02f1d2782d1cbcd2d3b47da5f0df36a3
-
Filesize
24KB
MD5ca36933e6dea7aa507a272121b34fdbb
SHA13b4741ca0308b345de5ecf6c3565b1dbacb0fb86
SHA256fd14449eb781c58e6e7196a384caf25cba0c59ebdba3b10f8ca0ecfd0c076b5d
SHA5125a9b186ecf085765caee97a2910008dda926ce412001042e165184083a52fb5fb70f05ca781cd2f7740ecbd938895c77c5aa0f9eb8d812b92f412f336212720e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c9117a362679f362d003727fc3c8e8e7
SHA18f35e6d81932a7d26affbbc123d1522167fab492
SHA256d4e4870965404d87f0eebc60a2a506d38424ae22efe52942770f6db4c53e1c27
SHA512227497d1ebe610d70f6067695beeea3aa8f427ee26982b7cbf354e56987b38782373cfb2f414f2829d87eef7723b84124e3e68111bb024756fe540298f953620
-
Filesize
11KB
MD5a56f9ab8420176730c4539de8d6d51f2
SHA17a79b425ee34bc7d659b5d069dcbf6bfc128f772
SHA256c7d72baa0c394108c295637964969f0bb9f3874ca16d6ab762a71ffa0cd3c644
SHA5125a956332101db934840cb320bb78b293904c4f1276f7cec18b442d1cb5b554e440b7ed8fcc238e04d14b0b781c3facfbbf47953e3bbb1b1e677e71297e07c3f3