Analysis
-
max time kernel
976s -
max time network
989s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 10:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.espruino.com/mosfets#:~:text=MOSFETs%20only%20switch%20current%20flowing,the%20source%20to%20the%20drain).
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.espruino.com/mosfets#:~:text=MOSFETs%20only%20switch%20current%20flowing,the%20source%20to%20the%20drain).
Resource
win10v2004-20231215-en
General
-
Target
https://www.espruino.com/mosfets#:~:text=MOSFETs%20only%20switch%20current%20flowing,the%20source%20to%20the%20drain).
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 4420 msedge.exe 4420 msedge.exe 3692 identity_helper.exe 3692 identity_helper.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2384 2416 msedge.exe 91 PID 2416 wrote to memory of 2384 2416 msedge.exe 91 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 3104 2416 msedge.exe 93 PID 2416 wrote to memory of 4420 2416 msedge.exe 94 PID 2416 wrote to memory of 4420 2416 msedge.exe 94 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95 PID 2416 wrote to memory of 3808 2416 msedge.exe 95
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.espruino.com/mosfets#:~:text=MOSFETs%20only%20switch%20current%20flowing,the%20source%20to%20the%20drain).1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa22e146f8,0x7ffa22e14708,0x7ffa22e147182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12381449470368720622,5983432609372408096,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52b115d6f7c146cf9ac387b1eadbee46b
SHA1e40d4640c5a00e238e26d967165836dc73c47083
SHA25646060d68011db4b857f7801edf01307a42b8c768feb2feafc2f0d68dcee6dde6
SHA5120ec017f82874f9d84b366df2c823b59480b70eb8f883df7ada0b0b5652c1da67fc93cf9fd0281b489ff8a4abfc5b32dd8cc9279e990feb1d7eaac3f8f55b9f16
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
520B
MD5a87d91182a9769435545d7b1ef127e7e
SHA1049dfed3405677f6933c9e01c88a414cf945a571
SHA2563118ad6ba2dc6018c1a1e3acb22bcca39532a26c7a5d6ea37b283ef145964cdc
SHA5121e8f130b639080dcd67706596abceb43042fcddd09cae6e1c0920457c4f7d4c7ca17961d33045c2c5c3f3747ebe61e609597a2040e2281f0ae61effb8403a488
-
Filesize
5KB
MD58cd9fa591a3e3a83f21876341ac409b7
SHA10419b135b1e4ebf02749d16d569cfd001e8adba3
SHA2566195d0933ac4efee4194035cbd63bf4f23356d2be8dd75b0c1117e2bbf2deb3b
SHA5125ea77add8e5a29175e33f0c8d0df394224b372be0d5557256b6baa828626fdac0bfb7c5776c4a22bcd91ef9a1f793fe288d317d6a1e1ed464239877fdf9d0b78
-
Filesize
5KB
MD51fe7d7cd59664e8b3dfc4d5426892510
SHA18bf938eb87b77c81a347f8d1fe3c8b259fdbd140
SHA25640d990cf4dda6f0502a86c3499b7b2fb63b0b9f796b871a86e37514cc5020c1c
SHA512ce52b8710207c16906e8afedc4c9c7a0d30ca029b1f4b5732e101d0207c6ef0a2e7e40eaff4d741dbf012791198a465a245e6a8d758f572b04a39638e36c8f1c
-
Filesize
5KB
MD530ace5ab60f18f28e5fa5aeb3cc526be
SHA1f68b039bd9f3291290bc613dee21d6c530c260ee
SHA25644b70e8cc11d66129304f0b239c07a7c197e852b749d3718daabb74a7658312a
SHA51214d3be7a6772c1eead88e9f2b9d0b61c35006e49895b0f61f6b2879413902bb1b794076f970a4f1d6ab8d8a8dea65422b28fe50af9135e9e0976aa89c49e26d7
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
3KB
MD596bb903ea7ec9aa78174a6fdd930eddd
SHA1dc359f09e5f36cea1975f7fd9c740e12114fddd3
SHA2568f6a8bc73ac02af556bd0810296151bbaeffa177d8bf3f2c2aa5ab73bf3fda7f
SHA512ac5778f10b2c20b2e1afe2228af6e654d89850ce4a324c9db6abda9cdf44c27c2a9da2c974b38164d872dc3c7bea748aba06cd3e6fd004f4e3f67f5882c899ef
-
Filesize
10KB
MD545712e9e59f98c93aa2d06336c0c82eb
SHA1d47367dc900ceb78111d3dfd71e6d887154e25b0
SHA256adf71b15eaeb15368eee7ab2e67e8e3e1ba542115bcd5590e2cfedada4926666
SHA5128990628d2d9e0aa8b81e65d22143a1b3fbbe9141889e77624ba05a1356c82ac7a5b1b237fc523a5cbdf7e7d6ff8f73d68713dca45b450b69900770d022594832