Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 10:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://international.standardbank.com/
Resource
win10v2004-20231023-en
General
-
Target
https://international.standardbank.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 2452 identity_helper.exe 2452 identity_helper.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 676 3016 msedge.exe 48 PID 3016 wrote to memory of 676 3016 msedge.exe 48 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 1608 3016 msedge.exe 86 PID 3016 wrote to memory of 2724 3016 msedge.exe 84 PID 3016 wrote to memory of 2724 3016 msedge.exe 84 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85 PID 3016 wrote to memory of 4704 3016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://international.standardbank.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd50ad46f8,0x7ffd50ad4708,0x7ffd50ad47182⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6471140370082441859,15002525943650406648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f30b8232b170bdbc7d9c741c82c4a73
SHA19abfca17624e13728bd7fa6547e7e26e0695d411
SHA2560916f816feace92a097267171f8aa8f944074530574a7aa1f9f0334899dfa3eb
SHA512587d973b13b97c5b92621c776c18348a13ef451ccda32977baa529de33e47a27e7920a57fe7c4d0b2f0e4a8a3bca5c62cc5798cf97f19556028f88afb38b37be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5faa89026420c9e2fa5f2a33ac7d37ef0
SHA15ff5e0e3e923d26c99f435cd2620152446ee8bbe
SHA256f991619fe1f043097467050fd9d5a3a837720da4de0ec39d08506802f26b4528
SHA51235b2747401c5c0acfe31c75024cc2416548f761b12d9f3da333f6398d8e07a74104fdc3f589986df6303e2eede5a2ba3a3eb7da69421759130dd2b98539b0d19
-
Filesize
1KB
MD50a7b89174af0fc4765fb278406785f44
SHA10f5047d0d621981dec62c4d1758320ea63c00fb9
SHA2569c7d149240c6af52b454e7a62c594b52b5c72729d6b15ef000662d670fe8c88d
SHA512445425f3f6e99b9c2c2249d993f339420608e7b9f739d51a85f38c2ba13ba2ed71aca6ae9d8aba4722ecfc0349fb1ed513cf592e9236385202edb5648002f0a4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a8d76bf58163069b678dfc11cc9c46be
SHA1244f56ae85edb644cb7ef5ea51bebe9e2b167233
SHA256415bd6903a00912063daadd98d7b28a4df86413106042ad432bc67474e75765e
SHA512d8579299c1ea8b74ae9d859bb5067e766be7eb99fdc94ce2905c78fe99931d78aa2b6abda0d383064c5b6a10ad6feeba0678a19a6db3eef961ef91b752206149
-
Filesize
5KB
MD59c6d6c3793a84c72085010f79587a0a5
SHA1ee24de447c26438634f63519a31381a1fcdd4851
SHA2569453491dc611a48e2b5b2410328fd448820b5e942b51c48884f466fabfe859ef
SHA5126ce43b462c72502a2db869f0d5feaf6d4e1cbced5ec328c0046ba46b84d0cd72d60ae5b034b813a58fa8385cda145628c5863d895f450d69d6bdf98c58e8bcd9
-
Filesize
6KB
MD5ee52df2bf4ae80b066b2e4dc6654c7f7
SHA1a2d0498cff3f3723e77fc0e250290295b49e06b6
SHA2569c1dc12618e15ad303c58bb285852bda112874e0af559f4945a92e8b1a3cb967
SHA512b0dc120813f0a58bef534a208c994f9b438bb945ce4a9fc95670f3f8c8a765ec0e35eca896333e62a91533f342ab3a55ddebae2a3e48b4b351b6b7c8400a1682
-
Filesize
24KB
MD50b8abe9b2d273da395ec7c5c0f376f32
SHA1d7b266fb7310cc71ab5fdb0ef68f5788e702f2ec
SHA2563751deeb9ad3db03e6b42dedcac68c1c9c7926a2beeaaa0820397b6ddb734a99
SHA5123dd503ddf2585038aa2fedc53d20bb9576f4619c3dc18089d7aba2c12dc0288447b2a481327c291456d7958488ba2e2d4028af4ca2d30e92807c8b1cdcffc404
-
Filesize
1KB
MD55b7535ede2daa3375575774113c2df35
SHA1cb4a9f19cf031290051c79090ad0afd41554da68
SHA256f1ec42cb5acdfeb9a5f21c44fa27d9778eff137ff6676bb757421ae34bac602e
SHA5122c12240c9dcc0ba1a67250e93ebc2cc51e8f3b18ba950b1076f389ba84e5b38022d57e989b9253ff72c601ff056f668bbe312905ae270c1710031bdb11aac511
-
Filesize
1KB
MD51b3b94268e05c7300994cc6e9c04f68f
SHA1b23510be589b09192798d6311eaca05263b82424
SHA25623639b4a63f7722c6502bf611baf699e68f729e2d61ce0d0e9e6857f99d188d4
SHA512930f161f220859abf39bd41d1342b1dcad6ba78562a9ada1e89b319aa02196972d7f7c94d0151cd44c61c0eb6428e90655832ce497c5755994570c8f219f842b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b5d3757441d4297ad6acfa1018dba65a
SHA1b3264bd47e4b831c91340eecc67efd81c7366d83
SHA2560a31462fd2b81ff1b8bad5587f8e70d1e1e1950eac8506db6a7ebdffc24a4248
SHA5128bb21a359e13e0bc34e0719228177139b4a0947b81394d982ce369f49960322cda65abb0d07b6a05379ce739f2e9952aa97e7d9fa3145fac194d19724be63200