Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 19:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sendinc.com/r2/a9138295c32ed5f51918c9481a1a037aa6e38693bcb4ee941ad07dda7afeb9b2/5d70dfb9aae2354b482e5bb50b002523d07c0db4888e2badb7cc09f13f8a6ba2/483c5c6eab11f1f6283c7ba6a38699a2acefac3349826ce0c4cdec782309df3f/a5d883e628bcc9211c20ed55000c9140324313160c0967f30b30713f43ea5511/e8bc747d78c90f707d1c18ea6409c1e6b7ef0ab92b917541a50f2275c265ca02
Resource
win10v2004-20230915-en
General
-
Target
https://www.sendinc.com/r2/a9138295c32ed5f51918c9481a1a037aa6e38693bcb4ee941ad07dda7afeb9b2/5d70dfb9aae2354b482e5bb50b002523d07c0db4888e2badb7cc09f13f8a6ba2/483c5c6eab11f1f6283c7ba6a38699a2acefac3349826ce0c4cdec782309df3f/a5d883e628bcc9211c20ed55000c9140324313160c0967f30b30713f43ea5511/e8bc747d78c90f707d1c18ea6409c1e6b7ef0ab92b917541a50f2275c265ca02
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 3888 msedge.exe 3888 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 948 3888 msedge.exe 84 PID 3888 wrote to memory of 948 3888 msedge.exe 84 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 3588 3888 msedge.exe 87 PID 3888 wrote to memory of 4300 3888 msedge.exe 86 PID 3888 wrote to memory of 4300 3888 msedge.exe 86 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88 PID 3888 wrote to memory of 2880 3888 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.sendinc.com/r2/a9138295c32ed5f51918c9481a1a037aa6e38693bcb4ee941ad07dda7afeb9b2/5d70dfb9aae2354b482e5bb50b002523d07c0db4888e2badb7cc09f13f8a6ba2/483c5c6eab11f1f6283c7ba6a38699a2acefac3349826ce0c4cdec782309df3f/a5d883e628bcc9211c20ed55000c9140324313160c0967f30b30713f43ea5511/e8bc747d78c90f707d1c18ea6409c1e6b7ef0ab92b917541a50f2275c265ca021⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9d9746f8,0x7ffb9d974708,0x7ffb9d9747182⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2465880724250820326,1177872310397609560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5afdcc78ba60736c575ccca07403c06e9
SHA18f4f4437c7adca0f78c162f2c964ceefaf4e455a
SHA256f791cf12360df001b40c00194c0710cbfa87de25f5fda9b011218d0dbb78726d
SHA51291de024b24c8006ddbe1b2fe4734372a100353564677b63101f7005c412f6305c1f1ef712db63dc2de60ffb8010bd03f330c3ae42d285f8e2d9aabb875c544fc
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
871B
MD5211ecc1715f8d27ee125718a26f2c76a
SHA1fa16bc4a256e538e8f617b6894c27cd2b1c2e1fb
SHA256e3a45c42d234a6fcff295bc4d1372ff44610472dc858ad04f051fe14b02d4a12
SHA51285b8364b3b8c89b82a6b170781b6e2f4aff155c3f40c0832a69486f0dcd133b1fcdd322e3649497314c559bbe60c225592b54e3096ae98e3dddd7487c6a81b54
-
Filesize
5KB
MD5d97c165fd1f74c8dfb04418f528cdad2
SHA147cf31efa562868fdcc220f3b25ffe73d7d6eeb4
SHA2563ae42185b3adad4084263551f77b5816529ed77ab77d26e727ea6b8c95b41ef5
SHA512118f84149e7e674b6c1247fae75512fbc1c501e14a9b4c58010a7eeff98775d860d153d15b826475bbf0a47f345b3071e456047ba230e754d059e3c12ae81733
-
Filesize
6KB
MD5374d9d430380f4656a609667dc9ee4a2
SHA1793d26dd96a6509e4d27df654e8fb1713ed121f9
SHA2568580211b075a2abbf07a7a081838113a81092f082e2b9cd42477ad3d5823ce7f
SHA512ee8a1a61fe74bf5c9d16aa0d593d7c03a1c20931548fe79825d60ecfb84a2839dbdfdff8d0aa17af709b482cf0306352d04d4498c16d859d4eb4bbc2509e68bb
-
Filesize
5KB
MD52f7f00c4bef4b6bca3ca6674f98ed2fc
SHA10eda22d8058a4d40dc39002f1219b6ef6d754c06
SHA256920733949ccf20a0505c9b13601814c4ac7045f3ac47825541af0037e4db0629
SHA512a947638429f4ad6bd31ba70815eec541203c08c49a017acd8cdc40da259096ea7cc73f78b227a3c02c4243dcac1e848b568e529eddbd0d8d901e9111da9463dd
-
Filesize
6KB
MD5d66466fc9a0ab17f1ddf6938d61a217d
SHA17ef47f693270f96a275893cb04f98f242e79c9d3
SHA256cb2f023dac3615e3b822f4b146ac2efab00699238832dd0e8aa81eabd431e578
SHA512d77283d1bb404d965ba347f721ef334262ec6ad96f146ab4c23764cd3a869f47af8676644ff6b0454883698b4301180b3fc0d1ff0fbad9c79093575d6596196a
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d9119d3a78025156040d94de3129f45
SHA14a6841d7ca6641f4cf6669f49137412220346ee3
SHA256b65b76c54e204c7baa6448dd48223688ce84c773300dcf134cf1b0d332674730
SHA512f845b43215018005f08e7912d18df0f5b25ff90fcce2808c435e4c373cd7c2314a2a37897caedd2cc6c075240a1aeb77d9d521910fa060857781e7e376be9bff