Analysis
-
max time kernel
247s -
max time network
281s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://melcusme.bubbleapps.io/?cid=188934423478252192738288907411541144945734064346
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
https://melcusme.bubbleapps.io/?cid=188934423478252192738288907411541144945734064346
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral3
Sample
https://melcusme.bubbleapps.io/?cid=188934423478252192738288907411541144945734064346
Resource
android-x64-20231023.1-en
Behavioral task
behavioral4
Sample
https://melcusme.bubbleapps.io/?cid=188934423478252192738288907411541144945734064346
Resource
android-x64-arm64-20231023-en
General
-
Target
https://melcusme.bubbleapps.io/?cid=188934423478252192738288907411541144945734064346
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 2512 msedge.exe 2512 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1716 2512 msedge.exe 66 PID 2512 wrote to memory of 1716 2512 msedge.exe 66 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3996 2512 msedge.exe 86 PID 2512 wrote to memory of 3628 2512 msedge.exe 85 PID 2512 wrote to memory of 3628 2512 msedge.exe 85 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87 PID 2512 wrote to memory of 2148 2512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://melcusme.bubbleapps.io/?cid=1889344234782521927382889074115411449457340643461⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff882ba46f8,0x7ff882ba4708,0x7ff882ba47182⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6267914760948494665,8542033883623972747,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
Filesize
190B
MD563c77132014599156b32ba226d90ea37
SHA10d190a2f31548f43f8b5ea442087089176a962d8
SHA2561ef4fc66a29c185f94c7f1377cf3782fb8de9fd805bcddf8bfbbe934dbbc5b81
SHA5128eaf97526dacbca245e65d9960215f43dcb4f9ffa865ac4274d5d9058230064b382402a4c8b3ddac23dc68a250692adf98ae8e89932129b857748a6d86db5da4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5063e04a2ab021100673d28f7f699be52
SHA1a306b2edf21f28800707f89aa8e086e2339d7f8e
SHA256e2e95c3163c7b9b742de4966cf235ab29c980b42432ef2ea098211dbe84a7968
SHA512f45d262277fcfc17055e886e1e3e6e490e220ff98d84ed98efec56fa31d330cf7d0c6914f2f775679b629aa801e064d04806bf6bad6d782acd64b50a74290513
-
Filesize
5KB
MD5d509f11331a804bc88a3cdb2d8093cd4
SHA1be0a4f33efc5dbc47d8c2fdbf518fd747d96d8f5
SHA256783c302ba90adc14eacb31191be3ae2208463eaf738bad9889031e036b45c6b2
SHA51245d5e7134188fce3362f0a5f1c76a39111af484ebf30b4cab3c18deab627ed0f498db42936d22b9b1f37341dc1d2c8575c00dd2ea848f2aecc7a61cdd9ffb4c0
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52b88214ae1f197ca36d0d53014dc7b92
SHA1315ae2a6b5fd4c2edb573ae2ee14905d44fc6150
SHA256fc169c6458e509c27c91ea1bec7085ec16d73429558700cdbfd2d5d367ed7eb5
SHA5121799565d676ef90ce1153aab1e37732124223356120ce620c37a30bac8516f50b1d31fe97ae1a075838ff2172a90ff257571b7946d64a591dc786080e256bdfd