Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 17:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://8izazl7qub5.primevilaestates.com/redirect.cgi?ref=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&sso_reload=true
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://8izazl7qub5.primevilaestates.com/redirect.cgi?ref=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&sso_reload=true
Resource
win10v2004-20231222-en
General
-
Target
https://8izazl7qub5.primevilaestates.com/redirect.cgi?ref=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&sso_reload=true
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 5008 msedge.exe 5008 msedge.exe 832 identity_helper.exe 832 identity_helper.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1592 5008 msedge.exe 89 PID 5008 wrote to memory of 1592 5008 msedge.exe 89 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4760 5008 msedge.exe 92 PID 5008 wrote to memory of 4636 5008 msedge.exe 91 PID 5008 wrote to memory of 4636 5008 msedge.exe 91 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90 PID 5008 wrote to memory of 4460 5008 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://8izazl7qub5.primevilaestates.com/redirect.cgi?ref=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&sso_reload=true1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd095c46f8,0x7ffd095c4708,0x7ffd095c47182⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10572490399644905686,5439631483305378741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
244B
MD52968be26a1abf40cd0132749db56d0ef
SHA10e7cf31af2028cbfdbcbe180d50db992478a8c78
SHA2560337c1617a620a966bf9b2375b3e3c5c0ea9cbabadd5bf7d613cb7fedb9aa686
SHA51258df8a46083756ef7b8222857e8e1552d305390709a402ff1d6e018762609826c19c788334887ad5f5f4e191fffd191f93dac8cc20ba86ab0903c799e47bafd9
-
Filesize
5KB
MD52f9e758c32b474122882298954008a9f
SHA16d57fe35f1321b799b8e72dc5cce26d0b8fa8441
SHA2566a0eb4c502f4ef6d859d89541f0a14c5f40c25686b8c6be5331ae6d3d925865f
SHA5124177cbc6839386ab03f77048c0d5347b2a9d431d6523b0fca6d9b36fecb09e4f00f8867e352574ab1768ffda89df694de55a36dbe211aee20406ddf315a88733
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9f6e41a-269f-4b31-a89d-2192e49d450c.tmp
Filesize5KB
MD5b93c56e8aa23b731d1d6ecf5341f9d22
SHA15fbfbb32ed542ebfff1edda62e8a68782d3c05ce
SHA256b13a78925eeefd372be863d36000f577c648b6183a7c66c9554822f5b59b15f4
SHA51252325db7165d687ed0d642a787330d7f4fad0d5d8938c45aab72b816b04de7bad5e9cab073043ff2511ff1fd0250e84b9d7db79714ed5207852ab22b68bd2ece
-
Filesize
10KB
MD58cf9a0ee87861298ada2030872093f37
SHA1c5a24493fe3be3ae88e834ac4d4f5492f118f4ab
SHA256f80c8a444e4231ce46a60b19ccd1621ab4a7f11f731da668d68ae45271ef9757
SHA5127aec4233380296703d88aeedc0b33b1690c41df65c248f101151cefa5be363b95d6d2dea9f1aee18d874c5347d3108427512a95793564a39a02b81ecdfa09222