Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 12:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.post.lu/fr/particuliers/mobile/scoubido-avec-telephone?utm_source=POSTemail&utm_medium=banner&utm_campaign=scoubidobacktoschool23
Resource
win10v2004-20231020-en
General
-
Target
https://www.post.lu/fr/particuliers/mobile/scoubido-avec-telephone?utm_source=POSTemail&utm_medium=banner&utm_campaign=scoubidobacktoschool23
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 4764 msedge.exe 4764 msedge.exe 5744 identity_helper.exe 5744 identity_helper.exe 5908 msedge.exe 5908 msedge.exe 5908 msedge.exe 5908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 6032 4764 msedge.exe 85 PID 4764 wrote to memory of 6032 4764 msedge.exe 85 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 3460 4764 msedge.exe 87 PID 4764 wrote to memory of 2960 4764 msedge.exe 86 PID 4764 wrote to memory of 2960 4764 msedge.exe 86 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88 PID 4764 wrote to memory of 4092 4764 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.post.lu/fr/particuliers/mobile/scoubido-avec-telephone?utm_source=POSTemail&utm_medium=banner&utm_campaign=scoubidobacktoschool231⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd7d546f8,0x7ffbd7d54708,0x7ffbd7d547182⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,306075062888227236,6793050399214760114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50cf64697fc2784c9847420986e1640d9
SHA1529a3599e6d0a45784825f82b0aaaf914eac613d
SHA25698c2d1ecdee4883a243dc1160d6a613c15b980b28739b012392d50fa2d1033c5
SHA512040600746da1fd99bd624e9748c00c9eed74b6c99b02b22a4e99f7b4d7bc28b53c88224ab16912b7cc58193725d4a2f0cdd7461145bd2a97aa3bad9cee03d96a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5bb49d6a17522fa8e97aacf2c3c3b1d64
SHA172abc1da765b5c05e983fa7764d51c7d79300b42
SHA25670e1823a7180fd488b620419758c88c12f48e586c8c00e6a843be75def2ae305
SHA512087f3d37e7f77f80f6fbce0dd204213d41bcb7ef84d1cbfd0aa3fa18b8f7b1c838932802f51f82af3a6d3ed68c44ab5f4ddc3566e61a0e286c891c5fa9931ada
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
343B
MD5d2dacb14c80230440095b18f48f2f1e3
SHA15aaa4cf5a87ba15996e0d281bae24714a3c32528
SHA256c51311d9316e957bba2cb065b454a41997bd7d681a4b0d5aa9a2c8aa521248c4
SHA512e26ef5418255cde2d40c53b85a8bdcafbdac904b04355574bbfaca22b72459bdaa168159c2a9ec77dade6d817d3b0cb88a299188706d5e327ade73f81397467d
-
Filesize
5KB
MD53444e26d83a2971a020121b43eaefb31
SHA13eb59f5193de808cddaec308549114d1b3ed9c0d
SHA25608f2e45a1d3946e0cc2c0d0aa043fd6d3d91d690d12af5eb59ce636f4026236c
SHA512e75be5b824c1b478473ac313f909fde71437da87a983c0b34bc2fdb2e9084eb5de0ea223f1d0a1c20dfdcf8ed3f969c8e92e0c29bc0facb871381d1e916dc74c
-
Filesize
5KB
MD59bb8ec6b47f54aa33785afd24dbc91de
SHA18236a15e23579fa9d0868597e85e523d51450c2b
SHA256c7c9fde24c867598ccf650a16f5cfed5e1c558dcad4d26b7e16670c2dae5705d
SHA512746e4069840b0cd6b2ca6658bfa27bde7c1fedb5e3db6d4ab9f7ae1e6bf85967a441d7bcd429db57bf5e48edc5f3d65c6903958cf6442f219d125c31f7891da1
-
Filesize
5KB
MD5a7848140e98e8c4138c7ea93f6e64f93
SHA1908246987922d9b01b1894fdc2703db6c44e7ff0
SHA25659eb792794e5c6e4721f96f7b530cff1c2520324adee696c0292eeda65bbd843
SHA512619211ea139db6242a72fbe50a10f1a789f8ad1d2d607555ea327b7700385ee964ad45c4ccf8c60ff54c0dee980a1a497c4e8577cafe87dd98451f782a627537
-
Filesize
24KB
MD5f35a0be8995cc98feed95b67c8457fa2
SHA1c1d3dade38e54b303cc8a62cf5f486be9bf15be0
SHA256d3b9788d364980bcbedb5bdd823ead098f151ee6355f1c14dd5719ccbf2126d9
SHA5125711cdd2aa0252d2456bdfaa5953c512600dea31907d36fd869abec97f8540f0bfcf8a407602b627a23e3f5f1101e8bcf055233ad9ac1026e5df4c6591c45c24
-
Filesize
873B
MD56c28966d85dac717addc788c31fd6d14
SHA100925ff741efdac4a7d4c6cd72c1988be7a8e86a
SHA2560f805ba000a07ca99377dee3b9edbdadcdd07f60999e8e45dc7990eaea58cb4b
SHA512abbcd3c0ee17c9a58a61f3bc22cd3d6d6ee98301226e00accfa52aeadf096b17a231362f11283ecaedd7ceac78a2f8e8a11722610cc2196ecf1cc7bc772af651
-
Filesize
706B
MD59182111fbdc28293b65467f4858b126b
SHA1121e2db3395ecf69779f6fc01d611f3325d3e5a9
SHA256cc018da4a0ef938b181e73dac558d7a64c51702bfdb8a632731b23eddfbfc564
SHA512e55ba7f59381423188a01f27a0ba9888ed25d044f4cb3179b2938bca550c4adcc21dd3b1bad95772c1436aef18ef0e08132226cca87901b2db751788b0e7b378
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5533fe003f77f0bb5db39f1a5a3786a3a
SHA1d592d3190346b56c9038e67fecbb3f1c4bef124a
SHA2569bb0ac85cc4527b3ad7e5e9259ba24a4d8f0ed0a3f7ec69bbd07f6a1673c0a53
SHA5124ff6df180df32f09db113297cfdcf8668cb5262b288cc64ab02dea9855cfcc467035d484ea352a1cbab7027620d9aa19375653778f2a66cd40bcfefaeccc6357
-
Filesize
10KB
MD57a11d618d8ac34ad01f9e1c870c6fe58
SHA1efd6183f05bdfe8f8c34905ca6dff7b9ecd386c1
SHA256dee8d78137f796a6d28ec98906bc19628c99f6c32056c8935decbcac38b36663
SHA5120e47680da1397ad5d6c2857c1b7c7d3f123a2523e173e968dbc00c312ffcba407a84150782d7bcc765e8040091d1358865f2feee788f79679c79ba6351215933