Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 10:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ovitashu.sharepoint.com/:l:/s/PRELOMET/FNck9AG05sBAmUozNR8b9xkBFs4ttkjpATEFWoR-PF1SBw?e=3%3a9TVhrM&fromShare=true&at=9
Resource
win10v2004-20230915-en
General
-
Target
https://ovitashu.sharepoint.com/:l:/s/PRELOMET/FNck9AG05sBAmUozNR8b9xkBFs4ttkjpATEFWoR-PF1SBw?e=3%3a9TVhrM&fromShare=true&at=9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 5004 msedge.exe 5004 msedge.exe 4812 identity_helper.exe 4812 identity_helper.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4308 1052 msedge.exe 86 PID 1052 wrote to memory of 4308 1052 msedge.exe 86 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 4656 1052 msedge.exe 89 PID 1052 wrote to memory of 5004 1052 msedge.exe 88 PID 1052 wrote to memory of 5004 1052 msedge.exe 88 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90 PID 1052 wrote to memory of 4368 1052 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ovitashu.sharepoint.com/:l:/s/PRELOMET/FNck9AG05sBAmUozNR8b9xkBFs4ttkjpATEFWoR-PF1SBw?e=3%3a9TVhrM&fromShare=true&at=91⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bdcc46f8,0x7ff9bdcc4708,0x7ff9bdcc47182⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10360342705056628515,10472597054473520748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cbbe2f9ce9af7e0456f1409715168d99
SHA123c502c2557e3a2b68b57abaf6203350986924ae
SHA25660d39f25e0248e33a2f2df18563c1953ad0fb8e19ebef1b9f919599372938bd2
SHA512a466c03f7f260209b5a7c996e369041f04396b1b0fdd82023ec2dfe45fe4492cdf3a637752dbfdf1c301f9d8dc293564e000f65db7a0255297b9c433b912402f
-
Filesize
266B
MD507dc49edc05965fa24fce07d3851ae54
SHA1aa42719a5b10655a3abfe8ec715c7afdcf81a673
SHA25607002c5a557cf1c583da628270e302bd7bc5cda27656bf9dc59b9a1454f19b89
SHA512b6aada8d3383eef339b59deaac195ad4b41ce0ddd452f4784506915c08c583fd6dc2063aa4b2e5ec6f08a9d70c376ec4521f5af3a164ddf03d4af0e7ec4277e7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59b8c699b5241d372522c55e6a1e68c68
SHA15236e099486f03d1d4eaa10c5f489831a3920d52
SHA256f2ce19951a945bb66d8ebe04194baa5dbc227b6536322aec962cf5f1b15dd5c8
SHA512451363219fab699de2037992f5e709d3ac167cfe63cd9cf2007dee0b46c6568d3e8b9c40f382c8770d90fbfcfc770c5ce66bb3572b49b6b9b3f7a7fef8941029
-
Filesize
5KB
MD56fdb9189834faa67b7f27d533e2b4c60
SHA10f8ef58fbd6b3051833ae753a9ef77891657ff4c
SHA256276196be30a8709261cd716fac3d4f89c482410d389495615de542d7f31185f5
SHA512dc31eaac2f97cf4f2abec5fc7e4980a2288439b5bf7493be85e2af5c22a7e83a0bbca6a90d0b68bfd916ace032115c824e1a2b4a86dc60ba02c40b40e3746924
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580e6776174c9aa90038e0c67849318e4
SHA1084835f7fedc5d25ced42ec0156fbd3f3fdbc942
SHA256b8c1ba3c20f95f4d1a07f6a63535da7ce98e5ba9181345708fff16ac0a5f7d16
SHA5128d1dd1d9d66541c17fb8793e383387885a27bc2a6cfafc64ea75ac02ecbd648ac2ee461a1a6c2ef8da948e53148ed7a7cd84f807110f74b0ced4a1821e1ad71f