Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 01:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://entitled-levybenefits-exempt.info
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
https://entitled-levybenefits-exempt.info
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral3
Sample
https://entitled-levybenefits-exempt.info
Resource
android-x64-20231023.1-en
Behavioral task
behavioral4
Sample
https://entitled-levybenefits-exempt.info
Resource
android-x64-arm64-20231023-en
General
-
Target
https://entitled-levybenefits-exempt.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 1768 msedge.exe 1768 msedge.exe 632 identity_helper.exe 632 identity_helper.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 3388 1768 msedge.exe 18 PID 1768 wrote to memory of 3388 1768 msedge.exe 18 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 3260 1768 msedge.exe 85 PID 1768 wrote to memory of 4340 1768 msedge.exe 86 PID 1768 wrote to memory of 4340 1768 msedge.exe 86 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87 PID 1768 wrote to memory of 2732 1768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://entitled-levybenefits-exempt.info1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffded946f8,0x7fffded94708,0x7fffded947182⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,9174588692603025822,17167016208922521070,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d8446c811c9e01c3b838344073e9f656
SHA1f533907a7e3d57400a756ee4ecbea9b9862879bf
SHA256e918bb1d1e2f7da699bb32cb0b4812d3a1ed888d493fec699504519e9e1d734e
SHA51286e53a9280d9b2414af8f5b1907870c8857d5005b63bcba3ecdb8de48b1e262e1a02422db1dd4bb002d074e59ef326ba4bb6ac5b4204887fccb92417cdcefa01
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
574B
MD50fd4361058165b4f0d730694996aaf90
SHA135303136db91f8e00735195cc141c302985e7a19
SHA256bc946e3726433506082012a908d386c3201cc6ad2e93cf11df248d8c07e6077f
SHA512d5ce31e47378cd37f4e0af7c933c78df43cc67ee641b56969e34db9cc9f96d92087ce2e48b1b14150093764ba0e7d897042935238e9ffdf34c3f63405ec930fa
-
Filesize
5KB
MD580faf2106a2063f549c085973f2bab8d
SHA168b99491b751c771257c3fdc3b8b76b6248f45ff
SHA256e5db87c38e5fc0cc9ce8e94c14bf25871f05232f3dd863361f9716e81fd9a50e
SHA512bed3ee7164e8a608190a8e5bc610e95d72c41f08c8e19887562ee26d24932f6c4ca7341617d7195012ab64460cec56e43edb8b9381863162b58510e8b791bebc
-
Filesize
5KB
MD5e4dde520ec1058d8e390902d34502746
SHA1a66f0fb01f38a1821f93362f782d96a28b3d4af0
SHA25668b2bf4482953ba151e7d9f3719173350bf59bd146585b0dfaabe47120b2bb23
SHA5124aa0f1dbbbbb15bc52b66154f108151ae5fb0df3f54301a691d091b9ffc389881204a9f9f4a22922e27d0c1a10534a3cb0498b63bd002591ed7427eab8246c62
-
Filesize
5KB
MD53dd681d4bad4866012762c3283c9034f
SHA163bd81f11bcab56bb5aff94a722859c1b6a6deaf
SHA2563fcc294459f8f229ef881301b0a84ddcecac0df0987814e3145ce89e258892c0
SHA512942ad4a24b181968e194d68e83a9d4c8b5f0a72fbf479c2c48674d492728ad8c0035c85cfca9c637ae8746740791202dcf6a984d1fc897b8185b5fd2be9386e7
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b38ddaad824dcb1f2b2ec99bc394ebd2
SHA139a1917883f00d689f8d3d964e5726312cf1e3de
SHA256377b8801b781c4d3c0d16ce6c58b9d82447583edc5685066ac617e3d961dfd16
SHA51207d8010e7c85ae0ef3e319d14dbd7bfe34b85d0971749f40b73dd782508c88a8bfcbf9469f9dd42ee7b31712ee37fe9d7eb5540e130bd6bd9b3a658461019d72