Analysis
-
max time kernel
0s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 09:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clic.concurrences.com/track/click/30837516/www.concurrences.com?p=eyJzIjoiR1lEVmhzaXNPanFIWjhoSGNjcDkwbTU2c2pRIiwidiI6MSwicCI6IntcInVcIjozMDgzNzUxNixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb25jdXJyZW5jZXMuY29tXFxcL2VuXFxcL1wiLFwiaWRcIjpcImYyZDI5MTVkNzJhYzQwOGViYTU4M2JhNzVlNjE1ODc0XCIsXCJ1cmxfaWRzXCI6W1wiNmRlY2E0NmFjNjk4OWZjYWEyZDdhNGFmYmJiZjlhNTg4YWViMDcxM1wiXX0ifQ
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://clic.concurrences.com/track/click/30837516/www.concurrences.com?p=eyJzIjoiR1lEVmhzaXNPanFIWjhoSGNjcDkwbTU2c2pRIiwidiI6MSwicCI6IntcInVcIjozMDgzNzUxNixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb25jdXJyZW5jZXMuY29tXFxcL2VuXFxcL1wiLFwiaWRcIjpcImYyZDI5MTVkNzJhYzQwOGViYTU4M2JhNzVlNjE1ODc0XCIsXCJ1cmxfaWRzXCI6W1wiNmRlY2E0NmFjNjk4OWZjYWEyZDdhNGFmYmJiZjlhNTg4YWViMDcxM1wiXX0ifQ
Resource
win10v2004-20231215-en
General
-
Target
http://clic.concurrences.com/track/click/30837516/www.concurrences.com?p=eyJzIjoiR1lEVmhzaXNPanFIWjhoSGNjcDkwbTU2c2pRIiwidiI6MSwicCI6IntcInVcIjozMDgzNzUxNixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb25jdXJyZW5jZXMuY29tXFxcL2VuXFxcL1wiLFwiaWRcIjpcImYyZDI5MTVkNzJhYzQwOGViYTU4M2JhNzVlNjE1ODc0XCIsXCJ1cmxfaWRzXCI6W1wiNmRlY2E0NmFjNjk4OWZjYWEyZDdhNGFmYmJiZjlhNTg4YWViMDcxM1wiXX0ifQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2792 2564 msedge.exe 14 PID 2564 wrote to memory of 2792 2564 msedge.exe 14
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dc0746f8,0x7ff9dc074708,0x7ff9dc0747181⤵PID:2792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://clic.concurrences.com/track/click/30837516/www.concurrences.com?p=eyJzIjoiR1lEVmhzaXNPanFIWjhoSGNjcDkwbTU2c2pRIiwidiI6MSwicCI6IntcInVcIjozMDgzNzUxNixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb25jdXJyZW5jZXMuY29tXFxcL2VuXFxcL1wiLFwiaWRcIjpcImYyZDI5MTVkNzJhYzQwOGViYTU4M2JhNzVlNjE1ODc0XCIsXCJ1cmxfaWRzXCI6W1wiNmRlY2E0NmFjNjk4OWZjYWEyZDdhNGFmYmJiZjlhNTg4YWViMDcxM1wiXX0ifQ1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6479980791163312156,6669564897920140269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5e1b5f81d00dd44299e411018ad99d509
SHA1210946dd5815c8febf2c457cae7d5f4c280102dc
SHA256608b9807d91b3b118b873056b6fd944b52790f9dd6a9e842a2500149ab6c37af
SHA512ff9d9fc1b8437c7d4dd7d154fa09f124a58298653bdbc694ac7e1530734cfc13374be45d26dd95055f85ecd2b3a1c2048e3d13b21d1ff52c4273e722e97c9d60
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2f09034-8441-4b6d-86d6-e2eeb57a5cd8.tmp
Filesize5KB
MD515b53801661bdfe74dace5abafc774b7
SHA1cd3208d232d97924f70d817c970710201096b006
SHA2565573782a5198e7147c413c303b64336792d2663971cbfb02d844636184563bf8
SHA5126b92a91e4093a180aaeb98f6aef20fcfd8d6830b49cf9f3fd014a7ec572e5389597d941f2f07bb24c64adbadfb3deb0eb980d928d3e4baf181be656dcd0a2f16
-
Filesize
10KB
MD51ba2c46d5e3113bfcf2cab2a5a865b6b
SHA1ff94f3aaeb55e2a55344772bf99a11ad495bae63
SHA2562e9d8a7fcaf638305162afd75fe16d0acb3893286b1287c939cc57fee789b547
SHA5124833f49d4a589cd0da93a236da17ef4debd18e060ddc9e59f4bc6ef944596196882deecc04be2b77355947df6945a42c25135da9b6f7101eb0fdc5f5c3b1aacd