Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 05:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.geilemilfjes.nl/login/871460/032670d54d04db09afd8477d19a8c9f8943b210d/notifications
Resource
win10v2004-20231020-en
General
-
Target
https://www.geilemilfjes.nl/login/871460/032670d54d04db09afd8477d19a8c9f8943b210d/notifications
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 1924 msedge.exe 1924 msedge.exe 1932 identity_helper.exe 1932 identity_helper.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3088 1924 msedge.exe 62 PID 1924 wrote to memory of 3088 1924 msedge.exe 62 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 1824 1924 msedge.exe 89 PID 1924 wrote to memory of 3824 1924 msedge.exe 93 PID 1924 wrote to memory of 3824 1924 msedge.exe 93 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90 PID 1924 wrote to memory of 552 1924 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.geilemilfjes.nl/login/871460/032670d54d04db09afd8477d19a8c9f8943b210d/notifications1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdee1246f8,0x7ffdee124708,0x7ffdee1247182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5269438372482981483,875210564705793880,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5215a20fb5aa31030ca417df1f04ac8cf
SHA18767f2b631a7f8009e56768cf7b79dc7c17338cc
SHA2560c0e2bebdf09f9afdc1d54ceb209a283e9457382a430963f6da9ba6f78e41564
SHA51204a26dd61ba34974127f0c7855238132efd7f5589cb227d36d08c2d2be149d796ead5457281568762767147088fc33249c3bd6f5005d5348889badfe98e34888
-
Filesize
1KB
MD5d95799c5339507286b3da5a79543b880
SHA169d9684e7c18bbf9aa0b16e907b92052e5a86cb1
SHA256ad498f1dcebe39414d459f0c1395e3b1bac2edb8ae24ca626183c83a04d057c0
SHA51205ecc7e97daa7d92c1143a7b3850b230935ee51d04505cfa7011680b04065d5de77eb14c06edbf51b5311974aad74b3a18430e0be17a5a521a1d9311398b1e6a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5683791ffe868a8db16bd4eb5d8141dd8
SHA1d72017548703292be1d932c981cc0dc1c507c242
SHA256c0639cbff4e6f7c38fbb45f04fdb352871d06247d928a0f2c9c9dd0437bcae61
SHA5124c3f4f7332260ffef39c2b9162a9a3da44a386a92483d5e9ba7429cbf3fa22588d62e9a2066d1a8fb4f7a2ca4177ecb48143dbd647d6ecdfc1591aaf66aee964
-
Filesize
5KB
MD51c15da779228057cdb400ddd59ffbd16
SHA18f9890ebace637955b96c9c155726850dcbc6b66
SHA2562f7a6219f591a8afe364101a8a4e122ea2ffee05ee8b4015e9ab82f664b85876
SHA512c0a411ac437d1001660167e554699ea337495abe66db5adcaf797ce0059966c10c7c2ac842227e844a0ec1755861f02fe7ce1394e61e9a1e57b1835efc2a84b8
-
Filesize
24KB
MD5eebb87276d4d8c8e86399953f1fd5d76
SHA12c1b7f15617dad6c5621c1a4dcd4f9e85b50c969
SHA25667b90d14705ba0d32de1a712d96cee5ff1ba058c11206bc892e11ae77f985bc8
SHA5129e48898e2dab7bf7b0b23242a2379d04bd717a76c8d2362b413cbae2d29ef2e50ae9cc5c4521a6092e53e12e64a2576bb13afff815574204e722d48cf041dccf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a59917d29d4451e03e620c4802287130
SHA17282ba8d57035db87e7fd47c2db149159cd109c0
SHA2567b2c518d9f65c286810c6a8be3c3ce13b751ef320dcc6c630852c58bfac5669c
SHA51255568aca4050e83e7bff5f7dbed90ecf4bc4c22e7083e44098dfdd7386525893d64a27e1654309d99bf46b334488e3ab8618cf0001cd2456ed32709d04fe6352